There are more connected devices, connected people and connected things than at any time in history and, as the 21st century progresses, this trend is set to continue. For many people, all this innovation is going to make the world a smarter, sharper and more captivating place to be, with new technologies offering us plenty… More 21st century cybercriminals: The threat landscape has evolved
Android/Twitoor is a backdoor capable of downloading other malware onto an infected device. It has been active for around one month. This malicious app can’t be found on any official Android app store – it probably spreads by SMS or via malicious URLs. It impersonates a porn player app or MMS application but without having… More First Twitter-controlled Android botnet discovered
Even though the Irish tend to use safer passwords than the global average, here are some safety tips just in case. Growing up before the age of the internet and social networks has left many older users unprepared for risks looming in the virtual world. From that perspective, today’s kids are lucky, as the best… More Do your kids know good password hygiene? Here are some rules
More than 800,000 usernames, email addresses, and birth dates are thought to have been stolen by hackers from online forums run by Epic Games. Epic, famed for developing popular games such as Unreal Tournament, Gears of War and Infinity Blade, are thought to have had members of their message boards exposed by hackers exploiting a… More Epic Games forums hacked again – over 800,000 gamers put at risk
Towards the end of July 2016, Kevin Townsend brought it to my attention that Europol, the European Union’s law enforcement agency, had announced an initiative to address the ransomware problem. No More Ransom is intended to provide information and help victims recover their data without paying a ransom to the criminals. As well as being quoted… More Ransomware: To pay or not to pay?
We all know about the various cyberthreats that organizations face today; the highly-sophisticated cybercriminal groups in operation; the new and old variants of malware that are deployed; the well-worn mistakes of the past that we continue to make (like opening phishing emails and insertinginfected USB sticks into our computers). Some of the solutions to these… More Why you should hire good, skilled cybersecurity professionals