Internet Security

Demystifying Heartbleed

David Emm | Posted 17.04.2014 | UK Tech
David Emm

First of all, although it sounds a bit bizarre, people shouldn't simply change their passwords automatically. This should only be done once you know that an online provider has patched the OpenSSL library and regenerated their digital certificates.

Michael Rundle

Change ALL Your Passwords Say Security Experts, In Wake Of Huge Computer Bug

HuffingtonPost.com | Michael Rundle | Posted 09.04.2014 | UK Tech

Security experts are advising the public to change their passwords in the wake of the Heartbleed bug, found at the core of the internet. That's all...

Michael Rundle

Catastrophic 'Heartbleed' Bug Could Be About To Devastate The Internet

HuffingtonPost.com | Michael Rundle | Posted 08.04.2014 | UK Tech

A critical bug found at the core of the internet could be about to cause havoc online. Known as 'Heartbleed', the bug has been found in part of the...

London 'Zombie Lords' Hijack The Internet For 300,000 Machines

Huffington Post UK | Posted 03.03.2014 | UK Tech

Two IP addresses based in London have managed to hijack more than 300,000 internet routers, according to security researchers in Wales. A paper by ...

What Smaller Businesses Can Learn From the Staysure Hack

Mike Foreman | Posted 16.03.2014 | UK Tech
Mike Foreman

Keep your security software updated - Don't be tempted to put it off till later. Most updates are improvements by a software company, patching up security threats and fixing bugs - if you don't update, you are creating vulnerabilities in your systems which could be utilised by hackers.

Why You Should Buy Internet Security and a Winter Coat

Lucy Karsten | Posted 29.01.2014 | UK Tech
Lucy Karsten

'You've got a virus,' my little sister said finally, sneering at me in a way that made it perfectly clear that she considered the whole matter beneath her. 'What internet security provider are you using?' I laughed, because internet security software is like ironing, or packing the night before a flight- done only by the neurotic or the elderly.

Should Offensive Words Be Banned From .UK Domain Names?

Huffington Post UK | Chris York | Posted 10.09.2013 | UK Tech

The government will support a review into whether offensive words should be banned from .uk domain names. Currently Nominet - the organisation resp...

Inappropriate Web Content: Filtering and Technology are Not the Only Issues

David Emm | Posted 27.10.2013 | UK Tech
David Emm

Whatever the outcome of the debate, technology can't replace parenting. And the greatest benefit of the debate is, to my mind, that it is raising awareness among parents and guardians about the risks and the protection already available to frame children's online experience in a safe way.

Hackers Target Ucas In Attempt To Sabotage A-Level Results

The Huffington Post UK | Lucy Sherriff | Posted 16.08.2013 | UK Universities & Education

Ucas was targeted by hackers who attempted to sabotage the system mere hours before thousands of students received their A-level results, the admissio...

Are Trolls Really Responsible for Teenage Suicide and What Can the Websites Do About Them?

Dr Nicholas M. Almond | Posted 13.10.2013 | UK Tech
Dr Nicholas M. Almond

The critical thing which needs to be done is that parents, guardians, teachers and friends need to take more responsibility to protect individuals who are young (and vulnerable) to ensure that they do not receive any abuse. These people can act as the 'Watchdogs', but they must understand how the internet works...

How Easy Is It For Someone To Steal Your Password If You Use Chrome?

Huffington Post UK | Posted 08.08.2013 | UK Tech

Veiwing this using Chrome? You might want to switch to Safari or Firefox after reading this. Software developer, Elliott Kember, has called into qu...

Down at the Watering-Hole

David Emm | Posted 07.09.2013 | UK Tech
David Emm

Drive-by downloads are a common method used to spread malware. Cybercriminals look for insecure web sites and plant a malicious script into HTTP or PHP code on one of the web pages. This script may install malware directly onto the computer of someone who visits the site, or it may take the form of an IFRAME that re-directs the victim to a site controlled by the cybercriminals.

They're After You: Five Tips for Dodging Cyber Criminals

Allen Scott | Posted 01.09.2013 | UK Tech
Allen Scott

In a world where we often spend more time online than we do in the 'real world' we will all make IT security mishaps at some point. Statistics from Experian Hitwise revealed that the UK spent 37 billion hours online last year. 1 The question is, how many of these hours were spent securely?

Online Security - Whose Responsibility?

David Emm | Posted 25.08.2013 | UK Tech
David Emm

Whose responsibility is it to ensure that we stay safe online? Government? Businesses? Security vendors? You and me? I believe that it's a shared responsibility.

What if Time Travel is Possible?

Graham Welch | Posted 09.07.2013 | UK Tech
Graham Welch

Today's cybercriminals are professional, well-funded, and highly motivated. Many of their attacks take place over a period of weeks, months or even years and are often highly focused and targeted.

Three Year Olds Going Online and Kids Accessing Porn - The Truth About Our Children's Screen Time.

Kate Gunn | Posted 30.06.2013 | UK Lifestyle
Kate Gunn

I was once the perfect mother. TV time was strictly controlled, no sugary sweets would pass my little darlings lips, and there was absolutely no way they would be allowed to use iPads, iPhones, Xboxes, computers or any other internet connecting medium until they were mature enough to use them. Possibly not even then. Of course that was before I actually had any kids.

The Connected Consumer Cloud - one place to rule them all

Allen Scott | Posted 24.06.2013 | UK Tech
Allen Scott

With the doors now open for competitive 4G offerings from the major players, the proliferation of consumer content cloud services is one that operators are looking to, to drive loyalty and value.

Why Hire a Hacker?

Dominique Karg | Posted 18.05.2013 | UK Tech
Dominique Karg

It's only natural to use the tool that's been perfectly designed for the job yet, for some reason, when it comes to securing the corporate infrastructure, many are frightened by the idea of hiring a hacker. I believe they're missing out.

Java Exploits - Do You Need to Be Worried?

David Emm | Posted 06.05.2013 | UK Tech
David Emm

The targeting of well-known and regularly used social networks such as Twitter and Facebook naturally make the headlines. But Java-based attacks are not solely aimed at large corporations - the issue of cybercrime can be much closer to home for all of us.

UK Lacking IT Experts To Prevent Cyber Attacks

PA | Posted 12.02.2013 | UK

A dearth of skilled workers is hampering Britain's ability to protect itself from costly internet attacks and it could take two decades to fill the ga...

Safer Internet Day

David Emm | Posted 07.04.2013 | UK Tech
David Emm

When I was young, having fun involved kicking a ball around the park, building a den at the bottom of the garden or playing hide and seek with friends. Today it's an entirely different landscape thanks to the endless opportunities for fun offered by online gaming, social networks and apps.

Demystifying Rocra

David Emm | Posted 26.03.2013 | UK Tech
David Emm

If you have stumbled across the phrase 'Red October' in the past few weeks, you may think it sounds like an operation from a John le Carré novel. In ...

Safeguarding Your Digital Life: How to Stay Safe in 2013

David Emm | Posted 11.02.2013 | UK Tech
David Emm

As 2012 draws to an end, it's fair to say it's been a very busy year for cybercriminals! So what have we learnt from the past year and what do we need to be wary of in 2013 to ensure that both our data and our wallet remain protected?

Social Networking or Identity Sharing: What Information Should You Give Away Online?

David Emm | Posted 23.01.2013 | UK Tech
David Emm

There has been a lot of debate recently about how much information we should give away online. Just a couple of weeks ago, Cabinet Office Internet security chief, Andy Smith, publicly suggested that we should use fake details online in order to protect our security. But is this really the right approach to staying safe online?

Emma Watson Is 'Internet's Most Dangerous Search Term'

Huffington Post UK | Michael Rundle | Posted 10.09.2012 | UK Tech

Emma Watson is officially the most dangerous woman on the internet. The news came via McAfee's annual survey of the celebs most likely to land user...