Security Feature: Malware can be equally dangerous on all operating systems

Social engineers don’t care about your OS: and nor should you Security companies in general and, unfortunately, anti-malware companies in particular, are often accused of ‘hyping’ threats because of a perceived self-interest. However, in the main, legitimate vendors and researchers like those at ESET typically try to resist overhyping or playing up threats where possible, … More Security Feature: Malware can be equally dangerous on all operating systems

Facebook Privacy: An Easy How-to Guide to Protecting Yourself

Introduction As the sun is setting and I breathe some of the night time air I am inspired to write about Facebook.  Yes, *the* Facebook, the third largest country if it were a physical place with boundaries under a common rule of law and government.  When many people use a service such as this, it … More Facebook Privacy: An Easy How-to Guide to Protecting Yourself

Security Feature: No chocolates for my passwords please!

We have published guidance material previously on passwords and passphrases, some are blogs and some are lengthier depending on your liking (link & link).  Even still it is always good practice to reinforce sensible password techniques.  For this blog, I plan on sharing an analogous self-ritual, and one that relies on a third party application … More Security Feature: No chocolates for my passwords please!

Security Feature: Push a fork into the socket to see who’s viewing your profile

We keep warning of Facebook scams, but people keep clicking. We keep explaining dangers of malware, but people still keep clicking. Why are people sometimes so silly when it comes to computer security? With all the warnings, with all the factual data on damage done, they still don’t take computer security seriously, even at a … More Security Feature: Push a fork into the socket to see who’s viewing your profile

Libya and Osama bin Laden Dominate Cyber-threats Heading into May

The death of Osama bin Laden has gone viral with blogs, social media and search engines pumping terabytes of rumour, innuendo and conspiracy theories at the speed of light, along with the occasional kilobyte of truth. That was the state of global malware map after the death of Osama bin Laden that came in early … More Libya and Osama bin Laden Dominate Cyber-threats Heading into May