We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

More Security Opinion

  • Opinion: Five Steps to Mobile Device Management and Security

    First there were sewing-machine sized portable PCs, then laptops, the Newton, the Palm Pilot, and phones with built-in PDA functions. The iPhone led the way to the ubiquitous smartphone, and the iPad ushered in an era of tablets. Now wireless hotspots, printers, storage, and a variety of other devices are making their way onto your office network, possibly without the knowledge of managers.

  • Opinion: Safety: The Missing Third Leg in the Energy Storage Stool

    Electrons don't like to sit still. That's why the electricity grid has developed over the last 150 years without the benefit of energy storage. Energy storage is--in whatever form it might take--an elaborate attempt at getting electrons to behave while in a passive state. It's been clear for thousands of years that energy storage is physically possible. What has held it back from widespread adoption (outside of fossil fuels and consumer electronics batteries) has been safety. Safety can be achieved, but the cost of engineering danger-mitigation solutions makes most energy storage systems too costly. A recent string of safety incidents at new energy storage facilities around the world have underlined the fact.

  • Opinion: Poll Results: Most Companies Secure Their Wi-Fi

    On Monday, we asked readers how they manage guest Internet access at their companies. The results showed that very few business and IT managers appear to

  • Opinion: Want Better Wi-Fi? Five Things You Need

    Laptops used to be the only devices on the company's wireless network. But Wi-Fi has become a ubiquitous standard used by a host of devices--including desktop PCs, laptops, netbooks, tablets, smartphones, printers, storage devices, and projectors.

  • Opinion: Hacker Collective Anonymous Strikes at Child Porn Sites

    Hacker collective Anonymous is at it again, and this time it is targeting websites that allow users to share child porn.

  • Opinion: iPad 2 Smart Cover Exposes Security Flaw

    Apple's Smart Covers are pretty cool--they attach magnetically to your iPad 2, and you can lock your iPad's screen simply by "closing" the cover. Lift the cover off the screen, and your iPad wakes right up. Unfortunately, members of the German forum Apfeltalk ("Apple Talk") discovered a bug in how iOS handles the Smart Cover that makes it possible to bypass the iPad's passcode screen. Yikes.

  • Opinion: Malware Uses Smartphone Accelerometers to Steal Keystrokes

    Did you know your smartphone's accelerometer can be used to steal keystrokes from a nearby keyboard?

  • Opinion: Google Beefs Up Security for Its Searchers

    SSL. You use it when you do online banking. You use it at some online shopping sites. And now you can use it to protect yourself when you do Google searches.

  • Opinion: Duqu: New Malware Is Stuxnet 2.0

    Researchers have identified a new malware threat which has been dubbed "Duqu". The new threat is apparently developed by the same author who developed the Stuxnet worm that was used in targeted attacks against Iranian nuclear power plants, but Duqu has its sights set on a completely different target.

  • Opinion: Google Rolls Out Security Resources for Internet Users

    Surfing the web these days can be like navigating a minefield--you'd like to take some basic security precautions, but you have no idea where to start. Google's new resource, called "Good To Know," aims to be your starting place.

  • Opinion: Keep Your Location Private on Facebook, Use Picasa's Photo Screen Saver

    Oh, Facebook. Always with the weird, unwanted, hard-to-undo changes. Like a couple weeks ago, I noticed that all of a sudden, every status update I posted included my location!

  • Opinion: Will One Antivirus Program Take Care of Your Security Needs?

    Bvs1216 uses Microsoft Security Essentials. He asked the Answer Line forum if he needs to supplement it for additional protection.

  • Opinion: Fake Netflix App Poses Data-Stealing Risk

    Android users have to be on the lookout for a Netflix app that looks almost exactly like Netflix's official product but carries a data-thieving Trojan instead of streaming movies.

  • Opinion: Hide Your Children, It's a Zero Day!

    It's time for a bit of a reality check regarding the "zero-day" bogeyman. It makes for great headlines, but a new report from Microsoft shows that the frightening menace of the zero-day is more urban myth than reality.

  • Opinion: CyanogenMod 7.1 Opens Hacking Doors to More Android Phones

    Android modders, rejoice! The team over at CyanogenMod has released a new update to its jailbreaking software, giving you the power to tinker with even more cellphone models.

  • Opinion: Computers Controlling Military Drones May Be Infected

    The computers used to control Predator and Raptor drones used in Afghanistan and other war zones have been reportedly infected by a virus that captures the keystrokes of the pilots operating the unmanned aircraft.

  • Opinion: Critical Updates Coming from Microsoft Next Week

    Next Tuesday is the second Tuesday in October, and that means it is Microsoft Patch Tuesday. Overall, it is a moderate month in terms of patch volume, but the couple that are rated as Critical should be addressed quickly to prevent exploits.

  • Opinion: Webroot SecureAnywhere Brings Protection to the Cloud

    Computer and data security is becoming a much more complex issue to manage for many businesses and consumers. Webroot hopes to simplify it, and make sure you are protected no matter what device or platform you might be using with the launch of SecureAnywhere.

  • Opinion: App Protects Facebook Users from Malicious Links

    "Security" isn't usually linked with "fun," but a Finnish security is taking a stab at connecting the two with its new application. F-Secure's ShareSafe app runs inside Facebook and flags links to dangerous websites before you post them to your friends' walls (or your own).

  • Opinion: New Mac Trojan Pretends to Be Flash

    Mac malware is still quite rare, but there is one new threat floating around that you should be aware of. A new Trojan for Mac OS X disguises itself as an installer for the Adobe Flash Player browser plug-in, according to security software company Intego. The good news (if you want to call it that)? This new malware doesn't appear to have spread very far as of yet.



IDG UK Sites

Windows 9 release date, price, features: Windows 9 will be a free update

IDG UK Sites

Why you shouldn't buy an iPhone 6 (or any smartphone) on contract: Get the latest tech and save...

IDG UK Sites

Corel Painter 2015 review

IDG UK Sites

Best iPhone 6, iPhone 6 Plus deals: iPhone 6, iPhone 6 Plus tariffs, contracts and prices UK