We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Latest Security Opinion

  • Opinion: Some files need encryption and some files don't

    Andre De Beer asked if certain files on his hard drive need encryption. Some do and some don't.

  • Opinion: Blackshades: how Police cracked down on the hackers

    Blackshades is a nasty form of creepware that can take control of a computer remotely and give hackers a dangerous amount of access to your data. A worldwide law enforcement operation this month caught the creators of the software, and arrested many who were engaged in criminal use. We explore the story, and see what damage Blackshades wreaked.

  • Opinion: PopVote, CloudFlare trump DDoS attack

    Popular events on the Internet tend to jam channels solid. Rugby Sevens tickets, collectible dolls, what-have-you...when popularity spikes, cyberdemand overwhelms servers. Massive e-tailers like Amazon or Taobao, for example, use scalability at high levels when their traffic spikes during seasonal events.

  • Opinion: How to stop Facebook experimenting on you

    Facebook's in the firing line this week for running psychological experiments on 689,000 of its users back in 2012. Sounds scary, right? Well...

  • Opinion: How Google declared open war against passwords at I/O

    Google hasn't been shy in the past about its desire to kill the password, and at Google I/O, the company started throwing punches.

  • Opinion: Google's move into home automation means even less privacy

    Plans by smart thermostat maker Nest Labs to share some customer data with corporate parent Google means the search engine giant will be fending off privacy concerns as it expands into home automation.

  • Opinion: With Android L, Google makes pitch for enterprise users

    Google will provide enterprise-focused security and management features to its entire Android showcase of mobile devices, including features reserved only for Samsung devices running Samsung security software called Knox, a Google executive announced during the Google I/O keynote address Wednesday.

  • Opinion: Watch the web get hacked in real time on this mesmerizing map

    The constant barrage of headlines trumpeting high-profile security breaches makes it easy to understand at a high level that hack attacks are on the rise, but mere words alone don't truly convey the scope of the constant threats. A mesmerizing example of data visualization by computer security firm Norse lets you see penetration attempts in real time, via a DEFCON-esque map that feels like it was ripped right from the old WarGames movie.

  • Opinion: Study: 7 in 10 concerned about security of Internet-of-Things

    The Internet-of-Things is a thing. If you haven't heard about it yet, get ready because we're in the early stages of an explosion of technology that will connect, monitor, and in some cases share almost every aspect of our lives. Fortinet conducted a survey of consumers to find out what people think about the security and privacy concerns of the Internet-of-Things.

  • Opinion: Study: Concern over mobile device theft on the rise

    Have you ever had a smartphone or tablet stolen? The devices' size and portability makes them prime targets for criminals, and there is a rising trend of people being mugged for their mobile devices. A new study found that consumers are increasingly concerned with the risk of having a mobile device stolen.

  • Opinion: Defend yourself against World Cup scams

    The 2014 World Cup tournament kicks off today in Brazil. Soccer (or football anywhere outside of the United States) is the most popular sport in the world, and billions of people will be following the matches closely. While you're busy figuring out how to stream games to your work PC while appearing to be busy with an Excel spreadsheet, you should be aware that World Cup will also be a feeding frenzy of malware and phishing attacks.

  • Opinion: Vigilance is the only cure for comment spam

    One of the best ways to demonstrate expertise and establish a positive reputation for your business or your employer is by sharing information through posts on a website. And one of the best ways to engage customers is to allow comments on those posts and to respond to them. If you're not careful, though, spammers will derail your comments and possibly drive potential customers away.

  • Opinion: TweetDeck patches XSS vulnerability after rampant pop-up spam

    If you saw strange pop-up messages in TweetDeck this morning, you weren't alone. It wasn't the work of the Syrian Electronic Army, just some relatively harmless XSS exploitation.

  • Opinion: Can your ISP read what you send over Facebook?

    Maeve asked "Can your ISP read conversations that you have with people over Facebook?"

  • Opinion: Google's Chrome Gmail encryption extension hides NSA-jabbing Easter Egg

    Google is famous for its Easter Eggs, including web pages that do barrel rolls or blink or hide video games--but rarely do Google's bits of fun take a political tone. Showing just unhappy the company or at least its engineers are with the National Security Agency's surveillance activities Google included a jab at America's spooks in a new Chrome browser extension.

  • Opinion: Snowden versus James Bond

    The media spotlight hit Hong Kong last year when former government contractor Edward J Snowden spilled the beans on the NSA's extensive spying program. The youthful tech guru then hightailed it to Russia, where he remains. In April, the Washington Post and Guardian US won the Pulitzer Prize for public service, one of journalism's more prestigious awards, for their articles based on NSA documents leaked by Snowden.

  • Opinion: How to protect yourself against Gameover Zeus and other botnets

    The U.S. Department of Justice announced today that the Gameover Zeus (GOZ) botnet has been taken down in an effort dubbed "Operation Tovar." The action was the result of a multinational effort between government agencies, law enforcement, and private companies to shut down the massive botnet responsible for more than $100 million in losses for victims. The cooperation necessary to take down the botnet is impressive, but there will be more, and it's important for individuals to understand how to avoid falling victim to these threats.

  • Opinion: Latest eBay flaw is a rookie mistake for a website

    When it rains it pours for eBay. Less than a week after the popular website revealed it was the victim of a massive data breach and directed users to change their passwords, researchers have discovered that it is vulnerable to serious flaws that could allow an attacker to access user accounts. Individuals need to know how to guard against falling victim to these security issues, and other businesses need to learn from eBay's mistakes and do a better job of protecting resources on the Web.

  • Opinion: Lookout's latest feature puts phone thieves on alert

    As sensible an idea as a mandatory kill switch feature would be for mobile devices, the people behind the Lookout security app for iOS and Android think that it's not the only thing you can do to safeguard your smartphone from theft.

  • Opinion: Spotify security breach hits just one user, but Android listeners encouraged to update app

    A single Spotify user has become the victim of a security breach, the company said on Tuesday.

Share this





IDG UK Sites

6 cheapest 4K TVs in the UK 2014: Get a UHD telly without breaking the bank

IDG UK Sites

Apple MacBook Air (11-inch, 256GB, Early 2014) lab tests and benchmarks

IDG UK Sites

How to stop your parents opening and responding to phishing emails

IDG UK Sites

Google to ship first Project Ara developer boards in July