How to secure your social media accounts

Social media platforms are increasingly being targeted, as Facebook CEO Mark Zuckerberg found out earlier this month. Here, we look at how to keep your accounts secure. Courtesy of Facebook, Twitter, Instagram and Snapchat...

Child safety: An unexpected radio interview

David Harley, talking about child safety and security in (and yet not in) the South Atlantic. On the air While a sizeable proportion of my income still comes from writing about security, I do very...

Different nations’ online banking habits: better safe than sorry?

When it comes to online banking, the UK and the US leads the way with security – over 70% of Brits and Americans have software installed on their device. Would you bank online without...

Five tips to help control your privacy on Mac OS X

Apple’s Mac OS X Mavericks has some very neat privacy features built in – from a “Guest User” account which restricts people to using Safari when borrowing your Mac to a panel which...

Windows exploitation in 2016

We are pleased to present our annual report Windows exploitation in 2016. In this latest version of our report, we offer a fresh look at modern security features in Windows 10. We are pleased...

the big threats and how to stay safe

At eight years old, Android is hugely popular. Both with users and attackers. At eight years old, Android is hugely popular. Both with users and attackers Happy Birthday Android! It has been eight years since...

It doesn’t hurt to know about this

Android malware is an increasing problem … but worry not – n this infographic, we highlight some of the key things you should be aware of. The most popular mobile platform in the world...

destructive hoaxes and the Internet of Not Things

The media have associated a number of destructive hoaxes with 4chan: people need some historical perspective on how the site actually works. * Clarke’s Third Law: Any sufficiently advanced technology is indistinguishable from magic. The starting point for...

The hacker games that made beating security feel like a thrill

Real-world hacking has long since spawned legions of more glamorous portrayals in videogames. Here are five of the best that take hacking and elevate it to thrilling levels. Real-world hacking has long since spawned...

Non-standard hacking platforms reign supreme

This year at Black Hat, tiny automated hacking platforms are everywhere, loaded with tasty purpose-built tools that can be used to break into your systems. This year at Black Hat, tiny automated hacking...

LATEST NEWS

MUST READ