We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

More Security Opinion

  • Opinion: Mobile malware 'celebrates' 10th anniversary

    The latest security news in three minutes, including Apple’s horrendous gotofail programming error, the Moon malware that affects a huge number of Linksys routers, and the 10-year anniversary of mobile malware.

  • Opinion: Dropcam expands its home security platform with Dropcam Tabs

    Dropcam Pro is one of the easiest Wi-Fi cameras to set up and use--we thought it could have helped the people in the Dexter universe avoid those pesky serial killers, or maybe just assisted the cops in catching them, with its CSI-like zoom-and-enhance feature. But even the best camera can only see so much.

  • Opinion: It's spring! Clean out your PC's junk with these free programs

    It's finally May. The winter frost is thawing across the U.S., and thoughts are turning to baseball, the Memorial Day weekend, and cleaning out your PC. Okay, maybe that last one isn't for everybody.

  • Opinion: IE zero day is the first sign of the XPocalypse

    Well, it took a bit longer than many security experts expected, but the first big security threat for Windows XP users has arrived. The zero day vulnerability will be quickly patched by Microsoft--for supported platforms at least. That means that this will be the first of many open wounds for Windows XP--known vulnerabilities left exposed because the OS is no longer supported by Microsoft.

  • Opinion: Spam turns 20 and is still going strong

    We recently passed an Internet milestone: April 12 marked the 20-year anniversary of commercialized spam. But even with two decades and trillions of unsolicited messages behind us, it seems there is still no end in sight.

  • Opinion: Protect your privacy while you browse

    It once sounded like paranoia; now it's more like common sense. Steve asked for safe and secure ways to access the Internet without being tracked by crooks, corporations, and governments.

  • Opinion: Twitter app downloads could put users at risk

    Twitter announced that it is putting its MoPub acquisition to use by enabling Twitter marketers to promote and distribute mobile apps. There is a potential opportunity there, though, for attackers to exploit the system if users become conditioned to download apps from their Twitter feed without thinking.

  • Opinion: Why you don't need to encrypt your backup

    Richard O'Hara backs up regularly to an external hard drive, but that leaves him worried. "How can I make the data on the external drive secure in case it's lost or stolen?"

  • Opinion: 10 tips to protect your tax return from theft and fraud

    As far as cyber criminals are concerned, tax season means open season. This time of year is a favorite for phishing scams and fraud, second only to the holidays. With a little awareness and common sense, though, you can avoid being a victim and make sure your tax refund ends up in your pocket.

  • Opinion: Watch out for photos containing malware

    Jerseygirlinfl asked the Answer Line forum if photos floating around the Internet could contain mailware.

  • Opinion: How to hide your online searches: We browse incognito with Disconnect and Silo

    Services that mask your identity online can preserve your privacy, but they can also be slow and unwieldy. Disconnect said Monday it had tweaked and upgraded its search capabilities to improve its speed, while Silo, an anonymous browser vendor, recently launched a personal edition for individuals.

  • Opinion: How to disable Windows 8's deep cloud integration, piece by piece

    You can accuse Windows 8.1 of a lot of things, but one thing you can't say about Microsoft's latest OS is that it lacks web integration. Thanks to deep integration with Bing, OneDrive, and other Microsoft online services, Windows 8.1 is most definitely where the desktop meets the cloud.

  • Opinion: In the big data breach era, the safety of your personal data is ultimately out of your hands

    Each time there's a high-profile data breach, security experts exhort the same best practices: Create unique logins for every service you use, use complex passwords, vigilantly comb your credit card statements for anomalies. The advice is sound. Unfortunately, it obscures the fact that the safety of your personal information is ultimately in the hands of companies you share it with.

  • Opinion: Bugs & Fixes: With exploit roaming in the wild, Adobe updates Flash and Air

    You don't want some evildoer to take over your system remotely, and neither does Adobe. Citing this potential vulnerability, Adobe patched its Flash Player to 12.0.0.7--and version 11 to 11.7.700.269 (Windows and Macintosh), and 11.2.202.341 (Linux).

  • Opinion: Twitter reportedly drops plan to encrypt direct messages

    End-to-end encryption is widely considered the best defense against a surveillance dragnet, but the tech companies that many of us interact with on a daily basis--Facebook, Google, Twitter--have been slow to offer protections for users. The Verge reported Wednesday that Twitter, which had reportedly planned to encrypt direct messages, has dropped the project to focus on more pressing matters.

  • Opinion: Bugs & Fixes: 18 vulnerabilities in IE, squashed

    March's Patch Tuesday listed only five updates, but they concealed a multitude of ills. One of the items (MS14-012) fixes eighteen vulnerabilities in Internet Explorer alone. The highlight: a fix to thwart remote-code execution from a "specially crafted webpage."

  • Opinion: Report: Average of 82,000 new malware threats per day in 2013

    Malware has been around for more than 40 years, but according to a report from Panda Security 20 percent of all of the malware that's ever existed was created in 2013. That's the equivalent of 30 million new malware threats in one year, or about 82,000 per day.

  • Opinion: Bill Gates: WhatsApp was pricey, Office needs 'more than a tuneup'

    Few people have a truly macroscopic perspective on the tech industry, and for decades, Bill Gates was one of them. Now, he's moved into an even broader role--trying to help architect society for the better.

  • Opinion: Bugs & Fixes: The Moon Worm slinks by Linksys E-series routers

    A slimy piece of malware called the moon worm has managed to slither past the login for Linksys E-series routers. SANS ISC said that it's the CGI script for the administration interface that's vulnerable, and recommends that you upgrade your firmware--when an upgrade that fixes the problem is made available. As of now, you're invited to switch off your E-series router's Remote Management Console to avoid possible hacking. If you never turned it on, you're in luck, it's disabled by default.

  • Opinion: How the Internet of Things opens your home to cyber threats

    Frankenmeat may not be the only spam in your refrigerator. A month or so ago, a smart refrigerator was identified as a source of malicious emails. That's just one example of the future we face as we connect millions of insecure devices to the Internet. Eric Vyncke, a distinguished engineer with Cisco, described the risks and proposed some solutions in a presentation at the RSA Security Conference in San Francisco last week.



IDG UK Sites

iPhone 6 release date, price, specs and new features: Convincing leaked photos show iPhone 6

IDG UK Sites

Gateway to your kingdom: why everybody should check and update their broadband router

IDG UK Sites

Netflix whips up 3D VR viewing room for Oculus Rift during company hack day

IDG UK Sites

Best Mac? Complete Apple Mac buyers guide for 2014