We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Latest Security Opinion

  • Opinion: Have a company laptop? Here's how to keep your browsing private

    Sj often takes an office laptop home. He wants to know if "the System admin from my office" can see what websites he visits at home.

  • Opinion: Supervalu breach shows why move to smartcards is long overdue

    The data breach disclosed by Supervalu is another reminder about why the ongoing migration of the U.S. payment system to smartcard technology can't happen fast enough.

  • Opinion: Cyber-Policing comes of age

    The National Crime Agency reported recently that it had detained over six hundred suspects in an online paedophile ring. This follows on from the recent international collaboration that saw the Blackshades malware taken out of circulation.

  • Opinion: DRIP: why the surveillance bill is bad news

    The Data Retention and Investigatory Powers bill was rushed through parliament as an emergency act in July, but it has raised huge questions of the government’s methods and motives. Here we look at what the bill is and why its such an issue.

  • Opinion: How to securely overwrite deleted files with a built-in Windows tool

    Most Windows users know that when you delete a file on a PC, it isn't truly gone and can still be recovered. In fact, those deleted files are actually just sitting there on your hard drive until they are overwritten with new data.

  • Opinion: Wearable Tech and Fitness Tracker Privacy Policies: Who Reads 'Em? (Poll)

    I've been thinking a lot lately about wearable technology and how the true value of many of today's wearables lies in data collection and the subsequent analysis and correlation of that information. The idea couldn't have been clearer at last month's Wearable Tech Expo in New York City, where Pebble's Chief Product Evangelist, Myriam Joire told attendees of her keynote address:

  • Opinion: Hands-on: miniLock's powerful file encryption is dead simple to use

    The creator of Cryptocat, Nadim Kobeissi, is back with another easy-to-use encryption tool. This time it's a Chrome app that aims to make it easy to create and share single encrypted files with others. Called miniLock, the app is freely available on the Chrome Web Store.

  • Opinion: Virtual servers still face real security threats

    Don't let the word "virtual" in virtual servers fool you. You're the only one who knows it's virtual. From the perspective of the virtual server itself, the devices connected to it, applications running on it, end-users connecting to it, or security threats trying to compromise it, the server is very, very real. A new survey from Kaspersky Labs found that many IT professionals understand that securing virtual environments is important, but don't fully understand the threats or how to properly defend against them.

  • Opinion: How free Wi-Fi could be stealing your data

    Free Wi-Fi spots are a very handy way to get online without using up your monthly 3G or 4G allowance, but are they genuine? Be careful of using unsecured hotspots, especially when conducting your private affairs. Here's how your data could be stolen and used against you.

  • Opinion: Are password managers secure?

    None of us can remember all our passwords. Yes, we know to use strong passwords, and we never use the same password on more than one site. It's troublesome, but it's part and parcel of our Internet privileges.

  • Opinion: Give Verizon your location data, get rewards in carrier's new program

    Verizon really wants your location data. And it's willing to give stuff away to get its 100-million-plus subscribers to hand that data over.

  • Opinion: Microsoft password research has fatal flaw

    I wrote yesterday about a report from Microsoft researchers, which goes against established password security best practices. The new guidance from the Microsoft researchers makes sense to me, because it fits how I handle password management already. However, at least one security expert feels that there is a fatal flaw that makes the new password advice impractical: You.

  • Opinion: Edward Snowden: Dropbox is 'hostile to privacy'

    Dropbox is a very popular cloud storage service, but NSA whistleblower Edward Snowden is no fan. In a recent interview with The Guardian, Snowden called Dropbox a "targeted, wannabe PRISM partner" that is "very hostile to privacy."

  • Opinion: The game isn't over yet for Gameover malware

    In early June the U.S. Department of Justice revealed that the Gameover Zeus (GOZ) botnet had been disabled thanks to the success of a joint effort dubbed "Operation Tovar." The celebration appears to have been premature, though, as security researchers have already discovered a resurgence of Gameover malware infections.

  • Opinion: ID cards and implants: convenient or a step too far?

    If you could have a chip implanted or carry around an ID card that meant you never again had to prove your ID, remember logins and passwords and so on, would you do it? That's the question we put to more than 4,000 visitors to PCAdvisor.co.uk, and the results might surprise you.

  • Opinion: Don't panic! Yes, Windows 7 is leaving mainstream support but it isn't being abandoned

    Earlier this week, Microsoft reminded the world that it will stop providing "mainstream support" for Windows 7 (and a slew of other products) in January of 2015. Immediately, the Web was flooded in a wave of confused or downright fearmongering headlines and articles implying that Windows 7 is following Windows XP into the graveyard.

  • Opinion: Some files need encryption and some files don't

    Andre De Beer asked if certain files on his hard drive need encryption. Some do and some don't.

  • Opinion: Blackshades: how Police cracked down on the hackers

    Blackshades is a nasty form of creepware that can take control of a computer remotely and give hackers a dangerous amount of access to your data. A worldwide law enforcement operation this month caught the creators of the software, and arrested many who were engaged in criminal use. We explore the story, and see what damage Blackshades wreaked.

  • Opinion: PopVote, CloudFlare trump DDoS attack

    Popular events on the Internet tend to jam channels solid. Rugby Sevens tickets, collectible dolls, what-have-you...when popularity spikes, cyberdemand overwhelms servers. Massive e-tailers like Amazon or Taobao, for example, use scalability at high levels when their traffic spikes during seasonal events.

  • Opinion: How to stop Facebook experimenting on you

    Facebook's in the firing line this week for running psychological experiments on 689,000 of its users back in 2012. Sounds scary, right? Well...

Share this





IDG UK Sites

Samsung Galaxy Alpha vs iPhone 5S comparison review: Metal smartphones fight

IDG UK Sites

Gateway to your kingdom: why everybody should check and update their broadband router

IDG UK Sites

Fonts review

IDG UK Sites

Best Mac? Complete Apple Mac buyers guide for 2014