Tips & advice


3185 articles

Cybercrime

“I was invited to their friend’s wedding!” Recycled Yahoo! IDs leak VERY private information

“I was invited to their friend’s wedding!” Recycled Yahoo! IDs leak VERY private information

Cybercrime

“I was invited to their friend’s wedding!” Recycled Yahoo! IDs leak VERY private information

Yahoo! recently began recycling “inactive” user accounts, in an effort to woo new customers - but some customers who have acquired these "second-hand" email addresses say they are receiving a “bonus” of personal information relating to the old owners.

Alan Martin25 Sep 2013


How To

BYO-Doh! How not to be the “bring your own disaster” guy

BYO-Doh! How not to be the “bring your own disaster” guy

How To

BYO-Doh! How not to be the “bring your own disaster” guy

Many workplaces allow wokers to bring their own smartphones, tablets and PCs to work - a practise described as "Bring Your Own Disaster" by IT wags for years. Disasters, of course, DO happen - our tips should help you avoid being the guy who brings one.

Rob Waugh24 Sep 2013


Ransomware

Filecoder: Holding your data to ransom

Filecoder: Holding your data to ransom

Ransomware

Filecoder: Holding your data to ransom

Trojans that encrypt user files and try to extort a ransom from the victim in exchange for a decryptor utility are nothing new. We’ve noted a significant increase in Filecoder activity over the past few summer months - in this blog post we address the questions we’re getting about this issue.

Robert Lipovsky23 Sep 2013


Cybercrime

Grand Theft Android: Gamers warned to avoid fake “iFruit” GTA app

Grand Theft Android: Gamers warned to avoid fake “iFruit” GTA app

Cybercrime

Grand Theft Android: Gamers warned to avoid fake “iFruit” GTA app

Rob Waugh22 Sep 2013


Cybercrime

Cybercriminals trying new tactics, security body warns - and attacks could have “large impact”

Cybercriminals trying new tactics, security body warns - and attacks could have “large impact”

Cybercrime

Cybercriminals trying new tactics, security body warns - and attacks could have “large impact”

Cybercriminals are switching tactics, a leading security body has warned - and the combination of anonymisation technologies, mobile devices, and social media attacks could lead to cyberattacks with a “large impact”.

Rob Waugh20 Sep 2013


Malware

Can't keep a bad man down: "Shylock" Trojan returns to attack U.S. banks

Can't keep a bad man down: "Shylock" Trojan returns to attack U.S. banks

Malware

Can't keep a bad man down: "Shylock" Trojan returns to attack U.S. banks

A stealthy banking Trojan known as Caphaw or Shylock has resurfaced - and is attacking customers of 24 American banks. It's armed with defensive abilities including the power to "restore" itself during shutdown.

Rob Waugh20 Sep 2013


Privacy

HIPAA 9/23 compliance deadline looms as breaches continue

HIPAA 9/23 compliance deadline looms as breaches continue

Privacy

HIPAA 9/23 compliance deadline looms as breaches continue

Stephen Cobb20 Sep 2013


How To

Live fast, die old: Pro browsing tips to enjoy the Web at full speed (and safely too)

Live fast, die old: Pro browsing tips to enjoy the Web at full speed (and safely too)

How To

Live fast, die old: Pro browsing tips to enjoy the Web at full speed (and safely too)

Malware, phishing and ID thieves are everywhere - but you don’t have to be paranoid, or hang back, or stop yourself enjoying the best the web has to offer. Our tips should help you browse with confidence.

Rob Waugh19 Sep 2013


Malware

Poison Apple? “Kissing” picture spreads Trojan to Mac users

Poison Apple? “Kissing” picture spreads Trojan to Mac users

Malware

Poison Apple? “Kissing” picture spreads Trojan to Mac users

A picture of a smooching couple actually delivers a kiss of death to Mac OS X users - it’s a new Mac Trojan which opens a backdoor on users’ machines. It’s the second piece of Mac malware detected in a week.

Rob Waugh19 Sep 2013