$250,000 Bounty For Downadup/Conficker Virus Creator
Who wants $250,000? I sure do! Off the top of my head, I can name more things than I can count that I can do with that much money. This amount – £172,000 – is actually well within your reach IF you...
View ArticleThe geeky "peephole"
Ah did I get your attention with the post title? Nah, this is not that post… rather a security post for your home, or your apartment. It’s the geeky way to see who’s outside knocking to get in. I use a...
View ArticleDealing With Laptop Theft
Thank goodness that I have not had to face this situation, and I am frantically crossing ALL of my fingers (if that’s even possible) that I would not have to find myself in such a bind – ever! Losing a...
View ArticleIs Norton cool enough to have its own comic book?
Norton, purveyor of Internet security products, is trying to be cool with the introduction of its own online comic book series set in the city of Netropolis: “While you’re visiting, there is something...
View ArticleFalse sense of security with Data Locker hard drive?
This hard drive may look fairly secure, being all rugged and fitted with a touchscreen for entering a numerical passcode to unlock the drive, but is it really that secure? It may well thwart the casual...
View ArticleiPhone worm maker lands app development job
Ashley Towns, the hacker who developed the Ikee worm which infected / rickrolled a number of unlocked iPhones, has got himself a job with iPhone application developer Mogeneration. Security firm Sophos...
View ArticleIs social networking less safe, or are users more stupid?
The summary of a new report into online security, the full version of which will be available tomorrow, suggest that social networks are less safe than a year ago. However, I am wondering if the fact...
View ArticleDiagram: choosing a secure password
Here’s an interesting diagram that seems to have been created against Google’s password strength checker. It shows weak, fair, good, strong and “unbreakable” passwords, as might be created by...
View ArticleCareless laptop users emitting Wi-Fi and alerting thieves
One of the latest warning issued by a security specialist is that of turning off your Wi-Fi connection before hibernating your notebook PC. According to Credant Technologies, some users are unwittingly...
View ArticleHow Strong Are Your Passwords?
Do you pay as much attention to your passwords as you need to? I will have to be honest and say that I probably need to be more vigilant in this regard. For the time that I spend online and all the...
View ArticleAdvantages of Using Keyless Door Locks
For many hundreds of years, man has relied on the classic key and lock way of securing doors and drawers. Though it has proven to be effective we’ve seen that it is not an entirely efficient or secure...
View ArticleHow Vulnerable Is Pokémon GO to Hacks?
The success of Pokémon Go has been truly unbelievable. But while parent company Nintendo has enjoyed rising stock and players have enjoyed the game, there has been a darker side to this augmented...
View Article5 Tips for a Successful Career in Cybersecurity
By 2021, there will be about 3.5 million unfilled jobs in cybersecurity. If you have been going back and forth about whether or not to pursue this line of work, it might help to know that these skills...
View ArticleGamers, Are You Taking the Privacy Game Seriously?
The Internet has made video gaming exceptionally convenient. It wasn’t too long ago when you needed to insert a floppy disk, CD, or DVD before you could start a game. Nowadays, you can simply download...
View Article
More Pages to Explore .....