We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
 

Latest Security Opinion

  • Opinion: Twitter app downloads could put users at risk

    Twitter announced that it is putting its MoPub acquisition to use by enabling Twitter marketers to promote and distribute mobile apps. There is a potential opportunity there, though, for attackers to exploit the system if users become conditioned to download apps from their Twitter feed without thinking.

  • Opinion: Why you don't need to encrypt your backup

    Richard O'Hara backs up regularly to an external hard drive, but that leaves him worried. "How can I make the data on the external drive secure in case it's lost or stolen?"

  • Opinion: 10 tips to protect your tax return from theft and fraud

    As far as cyber criminals are concerned, tax season means open season. This time of year is a favorite for phishing scams and fraud, second only to the holidays. With a little awareness and common sense, though, you can avoid being a victim and make sure your tax refund ends up in your pocket.

  • Opinion: Watch out for photos containing malware

    Jerseygirlinfl asked the Answer Line forum if photos floating around the Internet could contain mailware.

  • Opinion: How to hide your online searches: We browse incognito with Disconnect and Silo

    Services that mask your identity online can preserve your privacy, but they can also be slow and unwieldy. Disconnect said Monday it had tweaked and upgraded its search capabilities to improve its speed, while Silo, an anonymous browser vendor, recently launched a personal edition for individuals.

  • Opinion: How to disable Windows 8's deep cloud integration, piece by piece

    You can accuse Windows 8.1 of a lot of things, but one thing you can't say about Microsoft's latest OS is that it lacks web integration. Thanks to deep integration with Bing, OneDrive, and other Microsoft online services, Windows 8.1 is most definitely where the desktop meets the cloud.

  • Opinion: In the big data breach era, the safety of your personal data is ultimately out of your hands

    Each time there's a high-profile data breach, security experts exhort the same best practices: Create unique logins for every service you use, use complex passwords, vigilantly comb your credit card statements for anomalies. The advice is sound. Unfortunately, it obscures the fact that the safety of your personal information is ultimately in the hands of companies you share it with.

  • Opinion: Bugs & Fixes: With exploit roaming in the wild, Adobe updates Flash and Air

    You don't want some evildoer to take over your system remotely, and neither does Adobe. Citing this potential vulnerability, Adobe patched its Flash Player to 12.0.0.7--and version 11 to 11.7.700.269 (Windows and Macintosh), and 11.2.202.341 (Linux).

  • Opinion: Twitter reportedly drops plan to encrypt direct messages

    End-to-end encryption is widely considered the best defense against a surveillance dragnet, but the tech companies that many of us interact with on a daily basis--Facebook, Google, Twitter--have been slow to offer protections for users. The Verge reported Wednesday that Twitter, which had reportedly planned to encrypt direct messages, has dropped the project to focus on more pressing matters.

  • Opinion: Bugs & Fixes: 18 vulnerabilities in IE, squashed

    March's Patch Tuesday listed only five updates, but they concealed a multitude of ills. One of the items (MS14-012) fixes eighteen vulnerabilities in Internet Explorer alone. The highlight: a fix to thwart remote-code execution from a "specially crafted webpage."

  • Opinion: Report: Average of 82,000 new malware threats per day in 2013

    Malware has been around for more than 40 years, but according to a report from Panda Security 20 percent of all of the malware that's ever existed was created in 2013. That's the equivalent of 30 million new malware threats in one year, or about 82,000 per day.

  • Opinion: Bill Gates: WhatsApp was pricey, Office needs 'more than a tuneup'

    Few people have a truly macroscopic perspective on the tech industry, and for decades, Bill Gates was one of them. Now, he's moved into an even broader role--trying to help architect society for the better.

  • Opinion: Bugs & Fixes: The Moon Worm slinks by Linksys E-series routers

    A slimy piece of malware called the moon worm has managed to slither past the login for Linksys E-series routers. SANS ISC said that it's the CGI script for the administration interface that's vulnerable, and recommends that you upgrade your firmware--when an upgrade that fixes the problem is made available. As of now, you're invited to switch off your E-series router's Remote Management Console to avoid possible hacking. If you never turned it on, you're in luck, it's disabled by default.

  • Opinion: How the Internet of Things opens your home to cyber threats

    Frankenmeat may not be the only spam in your refrigerator. A month or so ago, a smart refrigerator was identified as a source of malicious emails. That's just one example of the future we face as we connect millions of insecure devices to the Internet. Eric Vyncke, a distinguished engineer with Cisco, described the risks and proposed some solutions in a presentation at the RSA Security Conference in San Francisco last week.

  • Opinion: OS X security patches have been issued--patch NOW

    If you're using Mac OS X, fire up the App Store: Apple has issued a series of security patches. Details can be found in an article on ZDNet here:

  • Opinion: Worms in Apple...again

    Thanks to mobile devices, Apple has gone from a niche computer-maker to one of the world's more powerful brands. But has Apple security sunk to new depths?

  • Opinion: NSA whistleblower Edward Snowden to hold live chat on Thursday

    If you've ever wanted to ask NSA whistleblower Edward Snowden a question, you might get your chance on Thursday, January 23 at 3 PM ET/12 PM Pacific. The man who revealed the startling revelations about the NSA's Prism program and cell phone metadata collection--and inspired a slew of security-focused apps and services--is lining up for his second official question and answer session tomorrow.

  • Opinion: Kill your data dead with these tips and tools

    There are lots of ways to obliterate sensitive data from of your drive: blast furnaces, degaussers (magnet field generators), sledgehammers, and secure-deletion software among them. These tools vary in effectiveness--especially as applied variously to hard drives, solid-state drives, and USB flash drives--and in the subsequent usability of the drive.

  • Opinion: Samsung exec teases iris recognition for the Galaxy S5

    Not to be outdone by Apple's use of fingerprint scanning technology in the iPhone 5S, Samsung is mulling the possibility of including iris recognition technology in the next Galaxy S smartphone. That's one of the hints Samsung Exec Lee Young Hee dropped on Bloomberg in a recent interview at CES 2014.

  • Opinion: Does the UK need an internet porn filter?

    BT has just enabled its porn filter, and Virgin will do the same later in 2014. But is ISP filtering the right way to go? We also look at how Google and Microsoft are blocking certain searches.

Share this





IDG UK Sites

Samsung Galaxy Note 4 release date, price and specs 2014

IDG UK Sites

iOS 8 features wishlist: the changes iPhone and iPad users want in Apple's iOS 8

IDG UK Sites

25 Years of the World Wide Web: Happy Birthday, Intenet

IDG UK Sites

Developers get access to more Sony camera features