customisable counter

How Windows 10 plans to defeat ransomware

How Windows 10 plans to defeat ransomware

The recent WannaCry and Petya ransomware attacks have caused massive disruptions for Windows users. Although ransomware infection has slowed down in the past few weeks, many experts are saying that this is only just the beginning. Soon, newer and far more dangerous strains of malware will be developed.

Wikileaks details router vulnerabilities

Wikileaks details router vulnerabilities

When we write about how antivirus software isn’t enough to keep you safe from malware, it’s not just scare tactics. There are so many ways hackers can break into your system that antivirus solutions will never catch. For a real-world example, look no further than the router exploit kit recently leaked from the CIA.

The Wikileaks CIA documents

For several months, the notorious website famous for leaking government data has been rolling out information it obtained from the Central Intelligence Agency.

New phishing protection for Gmail on Android

New phishing protection for Gmail on Android

One of the most common ways hackers infiltrate networks is by using phishing scams — fraudulent emails to trick unwitting users into giving away login credentials or downloading malware. Although this is the oldest trick in a hacker’s arsenal, it’s still an incredibly effective attack method.

The cloud is more secure than you think

The cloud is more secure than you think

Even to this day, the perception of cloud technology suffers from a reputation for bad security. But as time goes on we’re beginning to see that cloud security is almost always better than that of local area networks. So whether you’re considering a cloud web server or internet-based productivity software, take a minute to learn why the cloud your best option.

Malware on Android smartphones

Malware on Android smartphones

The average smartphone user doesn’t give nearly enough consideration to mobile phone security. In fact, smartphone users are more likely to get anxious about their phone’s physical safety than the more serious threat of malware. Malware and other forms of cyber threats are far more common in desktops and laptops particularly for business users, but with the increasing sophistication of cyber crimes, disregarding your other ‘lower risk’ devices’ security can mean disaster.