Carry On Scanning – Gmail In Court Over Targeted Ads Claims
If you are a business owner then you will undoubtedly need to send and receive countless emails every day. And there is every chance that some or all of those messages will contain data that you wish to keep private. If you have read the news today then you will know that traditional means of […]
Skip The Password Beat With A New 3FA Hearbeat Wristband
A security firm from Canada has unveiled a device which they say could replace our need for computer passwords, PIN numbers, screen locks and keys. The Nymi bracelet, made by Bionym, can be worn on the wrist and monitors the wearer’s cardiac rhythm which is as unique to them as their fingerprints are. Via a […]
No CyberWar As US Marine Corps Site Hacked With Propaganda Message From The SEA
We live in increasingly turbulent times (or, perhaps, just an era where such things are more widely reported thanks to the internet) with many a conflict beginning, or threatening to start, in the Middle East and other volatile parts of the world. Some days it seems like you cannot watch the news without seeing some […]
Your Smartphone Needs Securing Just The Same As Your Computer
For a long time now we have been living with a computer in almost every home. It is just one of those things that everyone has, much like a television or microwave. But slowly we are moving away from computers and we are heading towards a new dynamic. We are now living in a world […]
Why You Need To Create Seperate CMS Accounts For People Who Have Access To Your Server
These days it is likely that most of the work that you do will involve access with the web in some way. Even if your job does not seem to have anything to do with the web there is still a good chance that you are going to have to deal with it in some […]
China Experiences Its Largest Ever Largest DDoS Attack
The China Internet Network Information Center (CNNIC) said yesterday that the country had experienced a huge Distributed Denial of Service (DDoS) attack. A DDoS attack utilises a large number of computers (thousands generally) along with many internet connections to flood a server with packets until such time as it’s bandwidth and other resources become overloaded […]
German Federal Office For Information Claims Windows 8 Contains Backdoor
Leaked documents from the German Federal Office for Information Security (BSI) suggest that the German government believe that Windows 8 contains back doors that could be used to remotely control any computers that have that version of Microsoft’s operating system installed on them. The document claims that some Windows 8 machines have chips built into […]
Knowing Your Web Site Is Vulnerable Is One Thing But Acting Upon That Information Is Key
As I am sure many of you know already there have been many breaches of online newspapers and other media entities recently. Over the last few months the likes of the New York Times and the Washington Post have both had their web sites hacked and organisations such as the Syrian Electronic Army show no […]
Secunia Discontinues Vulnerability Coordination Reward Program
One area of research that has been of particular interest to computer security personnel recently has been discovering new vulnerabilities in software and web sites in return for cash. Many large companies, such as Google and Facebook, have developed bug bounty programs in recent years as a means of crowd sourcing a list of potential […]
Powerful Computers,Smartphones And Security Threats
People living in this digital age are extremely fortunate when it comes to computing and for many it is hard to imagine what kind of power they have sitting at their fingertips. On a high end cell phone these days there is more computing power on the device than that used to send the original […]