Journalist Kevin Townsend asked me a few months ago for commentary on phishing, for an article he was researching. He said: Phishing really comes down to 2 basic questions: Can technology ever solve the problem & what are the best approaches? Can awareness training ever solve the problem? How? If the answer is ‘no’ to … More Security and Education
Replacement screens for cracked smartphones bought from third party vendors could leave you vulnerable to hackers, a new study has revealed. The research, carried out by Israel’s Ben-Gurion University of the Negev, has shown how hackers can use replacement screens to override and steal data from the refurbished phones. Worryingly for users, the attack on these … More Hackers can control damaged phones using replacement screens
Passwords are often the first line of defense in protecting our personal and financial information, so it pays to have a strong, long and complex password (and easy to remember). Our one minute guide shows you how.
Hands up. I admit it. I’m not really of the Snapchat generation. Somehow or another I manage to make my way through daily life without feeling the need to chat with online friends through the incredibly popular (apart from in my house) smartphone app. Frankly, I’m worried – rightly or wrongly – that there might … More Enable Ghost Mode in Snapchat NOW if you want to keep your location private
The rapid global spread of technology, and the increasingly numerous types of interconnected devices routinely used, have greatly increased the number of attack vectors available to cybercriminals. This is why the exploitation of vulnerabilities is still one of our major concerns when it comes to corporate security incidents around the globe. For more detail, check out … More Trends 2017: Fewer vulnerabilities are being reported, but are we any safer?
The UK’s information commissioner Elizabeth Denham has urged businesses to be incentivized by the benefits of GDPR data security compliance, rather than the possible consequences. In a video addressing boardrooms across the country, Denham stated that businesses should not waste any time in preparing for “the biggest change to data protection law for a generation”. As … More ICO urges businesses to focus on becoming GDPR compliant
If surveillance, cybersecurity, and privacy are things you think about a lot, you should find The Circle, a new movie based on Dave Eggers’ 2013 novel of the same name, interesting viewing. This is one of two recent films that reflect how central these issues have become to modern life and popular culture (the other is … More Surveillance, cybersecurity, and the future of privacy in The Circle