M&S website temporarily suspended after leaking customers' details
Data breaches come in many different forms and sizes. Not all are a result of malicous hackers, but each can be just as devastating when victims' personal information falls into the wrong hands.Read more
What security & privacy risks does the Internet of Things present?
With the continual evolution of the internet and the devices that connect to it, there was a certain inevitability about the amalgamation of the two. Named the 'Internet of Things,' that coming together has opened up a whole new world of possibilities. But have manufacturers fully grasped the concepts of security and privacy surrounding this proliferation of web-enabled devices? ...Read more
This week in InfoSec - TalkTalk, 2$ Security & Contactless Card Theft
If nothing else, this week's news has taught us the importance of having an incident response plan in place and reminded us that we are individually all targets for criminals. But it's not all doom and gloom, as demonstrated by an enterprising 11-year-old who has made secure passwords her business. ...Read more
How to deal with revenge porn
Has someone taken explicit video footage or still images of you and posted it on the internet? If they have, I really feel for you; it’s a horrific, damaging crime. But there is some help out there in the form of the law and specialised support groups run by people just like you. ...Read more
What is social engineering and how can you avoid it?
Fool me once… hang on, have I just been socially engineered? It’s not only machines that can be hacked – humans can also be duped by malicious actors who leverage their knowledge of psychology to trick, deceive or otherwise bamboozle their way past security’s weakest link. ...Read more
What are the risks of mobile banking?
Do you have money in your bank account? If so, you may wish to keep it there. Read this article to find out how the convenience of online banking could deprive you of your hard-earned cash and learn what you can do to eliminate the risks. ...Read more
Latest GuidesPhone, internet, and TV discounts for veteransSeptember 21, 2017 / by Aimee O'DriscollHow to avoid common security holesSeptember 20, 2017 / by Jon WatsonThe best free rootkit removal, detection and scanner programsSeptember 18, 2017 / by Jon WatsonHow to remove spyware for free and which tools to useSeptember 14, 2017 / by Sam CookThe ultimate digital privacy guide for teachersSeptember 12, 2017 / by Jon WatsonHow to find and safely use wifi and cybercafes abroadSeptember 12, 2017 / by Aimee O'DriscollVPN statistics: What the numbers tell us about VPNsSeptember 11, 2017 / by Richard PattersonA brief history of government surveillance and spying and how it invades your privacySeptember 11, 2017 / by Chris StobingWindows recovery cheat sheet: System Restore, Refresh, Reset, Fresh Start and ReinstallSeptember 10, 2017 / by Al NelsonBest Mac antivirus programs: Top rated Mac antivirus programs for 2017August 31, 2017 / by Sam Cook + More guides
Latest Information SecurityHow to spot a fake, spoof or phishing emailAugust 24, 2016 / by Gillian JonesHow to secure your webcamAugust 17, 2016 / by David GilbertIs Skype Safe and Secure? What are the Alternatives?July 20, 2016 / by David GilbertPros and cons of password managers – Lee Munson vs. Simon EdwardsMay 19, 2016 / by Lee MunsonCEO Fraud and how to avoid falling victim to itApril 4, 2016 / by Lee Munson + More posts
Latest VPN & PrivacyHow to unblock DraftKings Fantasy Sports with a VPNJuly 31, 2017 / by Chris StobingWhat’s the Best VPN for China? 5 that still work in 2017 (and some that don’t)July 31, 2017 / by Paul BischoffThe best VPNs for Israel and some to avoidJuly 28, 2017 / by Osman HusainBest VPNs to unblock SnapchatJuly 28, 2017 / by Osman HusainThe best VPNs for Linux in 2017 (and the worst)July 27, 2017 / by Paul Bischoff + More posts
NewsletterSubscribe to our weekly newsletter to find out about the latest news: