News: Latest News

How to protect yourself from phishing scams

How to protect yourself from phishing scams

30th October 2014

There are different forms of phishing tactics. Criminals may try to trick you into giving away your personal information via emails, Social Media messages, IMs, text messages, and even Internet chat rooms. Sometimes criminals may try to fool you into installing...

Read more
Securing employee technology, step by step

Securing employee technology, step by step

30th October 2014

Mobile devices are indispensable for many companies. In a recent Symantec survey, nearly three out of four small and medium-sized business owners said that smartphones and tablets are critical for making their teams more productive. As business use of these devices...

Read more
How to choose a secure password

How to choose a secure password

30th October 2014

Passwords are the digital keys to our networks of friends, our work colleagues, and even our banking and payment services. We want to keep our passwords private to protect our personal lives, and that includes our financial information. While some cybercriminals may...

Read more
Online identity fraud: what you need to know

Online identity fraud: what you need to know

29th October 2014

Once criminals have enough of your personal details, they can apply for credit in your name and run up debts without you knowing. Your full name, date of birth, current address and national insurance number, and the passwords and PINs to your bank accounts are...

Read more
5 ways you didn't know you could get a virus, malware or your social account hacked

5 ways you didn't know you could get a virus, malware or your social account hacked

29th October 2014

Most tech-savvy folks are familiar with the standard forms of malware: phishing scams, adware, spyware, viruses, worms and the like. However, as technology advances, so do cybercriminals, and they are attempting to fly lower under the radar to get your information....

Read more
Exposing the hidden history of computer hacking

Exposing the hidden history of computer hacking

28th October 2014

In 1998, Chris Wysopal and friends discovered a way to shut down the internet.

Read more
10 malware terms explained

10 malware terms explained

28th October 2014

Most people seem to call every type of malware a “virus”, but that isn’t technically accurate. You’ve probably heard of many more terms beyond virus: malware, worm, Trojan, rootkit, keylogger, spyware, and more. But what do all these terms...

Read more
Cybercrime warning over 'dark web'

Cybercrime warning over 'dark web'

27th October 2014

Cybercrime is racing ahead of law enforcers' ability to control it as the "dark web", or "deep" internet, expands, a former senior civil servant warned.

Read more
Three quarters of Britons risking online safety

Three quarters of Britons risking online safety

27th October 2014

A new survey from Cyber Streetwise has revealed the vast majority of people are not taking the necessary steps to protect their identity online, with 75 per cent[i] admitting they do not follow best practice to create complex passwords.

Read more
The impact of a data breach can be minimised through encryption

The impact of a data breach can be minimised through encryption

24th October 2014

In October 2013, Adobe was breached. It was bad — really bad. Adobe lost control of an estimated 38 million customer records, including debit and credit cards. Later, the breach was described to include 150 million usernames and passwords.

Read more
«
2 3 4 5 6 7 8 9 10 11
»