We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

More Security Opinion

  • Opinion: How to disable Windows 8's deep cloud integration, piece by piece

    You can accuse Windows 8.1 of a lot of things, but one thing you can't say about Microsoft's latest OS is that it lacks web integration. Thanks to deep integration with Bing, OneDrive, and other Microsoft online services, Windows 8.1 is most definitely where the desktop meets the cloud.

  • Opinion: In the big data breach era, the safety of your personal data is ultimately out of your hands

    Each time there's a high-profile data breach, security experts exhort the same best practices: Create unique logins for every service you use, use complex passwords, vigilantly comb your credit card statements for anomalies. The advice is sound. Unfortunately, it obscures the fact that the safety of your personal information is ultimately in the hands of companies you share it with.

  • Opinion: Bugs & Fixes: With exploit roaming in the wild, Adobe updates Flash and Air

    You don't want some evildoer to take over your system remotely, and neither does Adobe. Citing this potential vulnerability, Adobe patched its Flash Player to version 11 to 11.7.700.269 (Windows and Macintosh), and (Linux).

  • Opinion: Twitter reportedly drops plan to encrypt direct messages

    End-to-end encryption is widely considered the best defense against a surveillance dragnet, but the tech companies that many of us interact with on a daily basis--Facebook, Google, Twitter--have been slow to offer protections for users. The Verge reported Wednesday that Twitter, which had reportedly planned to encrypt direct messages, has dropped the project to focus on more pressing matters.

  • Opinion: Bugs & Fixes: 18 vulnerabilities in IE, squashed

    March's Patch Tuesday listed only five updates, but they concealed a multitude of ills. One of the items (MS14-012) fixes eighteen vulnerabilities in Internet Explorer alone. The highlight: a fix to thwart remote-code execution from a "specially crafted webpage."

  • Opinion: Report: Average of 82,000 new malware threats per day in 2013

    Malware has been around for more than 40 years, but according to a report from Panda Security 20 percent of all of the malware that's ever existed was created in 2013. That's the equivalent of 30 million new malware threats in one year, or about 82,000 per day.

  • Opinion: Bill Gates: WhatsApp was pricey, Office needs 'more than a tuneup'

    Few people have a truly macroscopic perspective on the tech industry, and for decades, Bill Gates was one of them. Now, he's moved into an even broader role--trying to help architect society for the better.

  • Opinion: Bugs & Fixes: The Moon Worm slinks by Linksys E-series routers

    A slimy piece of malware called the moon worm has managed to slither past the login for Linksys E-series routers. SANS ISC said that it's the CGI script for the administration interface that's vulnerable, and recommends that you upgrade your firmware--when an upgrade that fixes the problem is made available. As of now, you're invited to switch off your E-series router's Remote Management Console to avoid possible hacking. If you never turned it on, you're in luck, it's disabled by default.

  • Opinion: How the Internet of Things opens your home to cyber threats

    Frankenmeat may not be the only spam in your refrigerator. A month or so ago, a smart refrigerator was identified as a source of malicious emails. That's just one example of the future we face as we connect millions of insecure devices to the Internet. Eric Vyncke, a distinguished engineer with Cisco, described the risks and proposed some solutions in a presentation at the RSA Security Conference in San Francisco last week.

  • Opinion: OS X security patches have been issued--patch NOW

    If you're using Mac OS X, fire up the App Store: Apple has issued a series of security patches. Details can be found in an article on ZDNet here:

  • Opinion: Worms in Apple...again

    Thanks to mobile devices, Apple has gone from a niche computer-maker to one of the world's more powerful brands. But has Apple security sunk to new depths?

  • Opinion: NSA whistleblower Edward Snowden to hold live chat on Thursday

    If you've ever wanted to ask NSA whistleblower Edward Snowden a question, you might get your chance on Thursday, January 23 at 3 PM ET/12 PM Pacific. The man who revealed the startling revelations about the NSA's Prism program and cell phone metadata collection--and inspired a slew of security-focused apps and services--is lining up for his second official question and answer session tomorrow.

  • Opinion: Kill your data dead with these tips and tools

    There are lots of ways to obliterate sensitive data from of your drive: blast furnaces, degaussers (magnet field generators), sledgehammers, and secure-deletion software among them. These tools vary in effectiveness--especially as applied variously to hard drives, solid-state drives, and USB flash drives--and in the subsequent usability of the drive.

  • Opinion: Samsung exec teases iris recognition for the Galaxy S5

    Not to be outdone by Apple's use of fingerprint scanning technology in the iPhone 5S, Samsung is mulling the possibility of including iris recognition technology in the next Galaxy S smartphone. That's one of the hints Samsung Exec Lee Young Hee dropped on Bloomberg in a recent interview at CES 2014.

  • Opinion: Does the UK need an internet porn filter?

    BT has just enabled its porn filter, and Virgin will do the same later in 2014. But is ISP filtering the right way to go? We also look at how Google and Microsoft are blocking certain searches.

  • Opinion: NSA caught with its hand in Google's (browser) cookie jar

    Ads that hound you from site to site don't seem quite so heinous in the wake of Tuesday's browser cookie-based revelation. The National Security Agency is reportedly using a particular kind of tracking cookie from Google to identify and track potential hacking targets. The NSA is also grabbing location data from third-party advertisers delivering ads to mobile apps, according to The Washington Post.

  • Opinion: Clean up your public Internet profile

    Maggs2378 found personal information "on one of those 'people search' web sites" and wants to know how to get it removed.

  • Opinion: Some password managers are safer than others

    Susan Taylor worries that password managers may not be sufficiently secure. "What if the password manager company is hacked?"

  • Opinion: Another NSA strike against USA tech biz

    In July, I wrote a blog post quoting a CSA (Cloud Security Alliance) survey which found that 10% of 207 officials at non-US companies have canceled contracts with US service providers following the revelation of the NSA spy program in June.

  • Opinion: 'Disarming Corruptor' disguises 3D printing designs to fight The Man

    3D printing promises a glorious future, one where you'll be able to create and manufacture nearly anything you can think of right from the comfort of your own home. But the future potential of 3D printing isn't limited by your imagination alone: The law is tossing up barriers for the nascent technology.

IDG UK Sites

OnePlus 2 / OnePlus Two UK release date, price and specification rumours: When is the OnePlus 2...

IDG UK Sites

Why I think the Apple Watch sucks and you'd be mad to buy it

IDG UK Sites

Ben & Holly's Game of Thrones titles spoof is delightfully silly

IDG UK Sites

Mac OS X 10.11 release date rumours: all the new features expected in Yosemite successor