Author
Rob Waugh
Rob Waugh
Independent Correspondent

Highlights of your career? Interviewing one of the team that broke the Enigma code.

What malware do you hate the most? The Love Bug - I was the guy who opened it.

Favorite activities? Testing smartphones (I often have three or more on the go).

When did you get your first computer and what kind was it? 1984, ZX Spectrum.

Favorite computer game/activity? World of Warcraft - but I gave up, and have been 'clean' for two years.

More Info

Cyber Monday – 12 tips to help you shop safely online

Technology might evolve, but cyber gangs rely on tried-and-tested tactics. With a bit of care and attention, it’s easy to sort the genuine bargains from the too-good-to-be-true fakes.

Smart home security – how not to be dumb with your devices

It’s easy to imagine that ALL connected devices – from fridges to CCTV cameras – are a security nightmare, but there are simple, sensible steps you can take to lock these risks down.

Can e-cigarettes give you malware?

The long-term health effects of electronic cigarettes – or E-cigarettes – are still open for discussion – but the devices could harm your computer, at least if one report is to be believed.

Week in Security: Grief for gamers, Unicorn spotted – and America wakes up

Cybercriminals once again had gamers in their sights this week, with leaks of multiple account details and a new Steam scam – but there was good news in the form of upgraded security on Whatsapp, and dawning awareness on privacy.

Facebook scams – ‘Naked woman eaten by shark’ is latest bait

The latest salacious video – promising ‘Naked Woman Eaten by a Shark’ – is just one in a long chain of viral video scams spread via Faceboook.

More than half of British firms ‘would consider hiring hackers’

More than half of British firms would consider hiring computer hackers in the face of a severe skills shortage – and more than 50% of executives said that they would consider hiring an expert even if they had a criminal record

Wireless attacks against ‘air gapped’ targets are possible, Israeli team claims

A team of Israeli researchers has demonstrated a way to hack into an ultra-secure air-gapped network, install malware, and retreive information – without using hardware such as USB keys.

Footage from thousands of home webcams found streaming on Russian site

A Russian website is showing off hundreds of feeds of live webcam footage from inside homes and businesses, which have been accessed by hacking into people’s webcams, CCTV systems and monitors.

U.S. State Department shuts down entire email system after suspected attack

The U.S. State Department has shut down its entire unclassified email system after a suspected intrusion – and technicians are now working to beef up email security systems.

Steam gamers targeted with ‘free screensaver’ phishing scam

Gamers on the popular Steam gaming service have been targeted with phishing scams via the service’s popular Marketplace – with apparent ‘bargains’ offering a sting in the tail.

Apple Pay and security – what you need to know

Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses a boom in cardless payments – both from Apple’s own system, and rivals playing catch-up.

Google security – how to lock down your Google account

If you use Gmail as your ‘main’ email account – or rely on Google services such as Drive for work – it’s well worth revisiting Google’s Settings menus to give your Google security a boost.

Wearable tech and security – can watches help?

So far, wearable tech has been of interest mainly to fitness fiends – but a new generation of hi-tech wearables comes armed with built-in scanners, biometrics and even ‘three-factor security’. Can a watch really keep secrets?

Internet trolls – how to deal with online abuse

Most internet users have faced some kind of problems with internet trolls – and a new study has thrown light on who they are. We discuss how best to deal with the online pests.

Counter surveillance tech – can gadgets spy-proof your life?

Over the past few years, counter surveillance gadgets which might have been the preserve of secretive government departments a decade ago have suddenly hit mainstream shops – from Mission Impossible-stlye self-destructing drives to some rather eerie counter-surveillance masks.

Privacy online – what you can do (and what you can’t)

Many of us have moments when we need, or want, to be more private online – when searching for a new job, for instance, or when having a private business conversation.

Cybercrime statistics offer a glimpse into the underworld

A crime-reporting survey in Canada has offered a unique insight into how cybercrime affects a large population – and an insight into a grim underworld dominated by fraud, violence and sexual abuse.

Ello privacy – what you need to know

For any security-conscious user, there are a few things worth remembering once you have secured that crucial invitation – we offer a few tips on how to get the most from the emoji-heavy network here.

JP Morgan Chase data breach – bank admits 76 million affected

JP Morgan Chase, one of the largest banks in America has admitted that a JP Morgan Chase data breach has affected 76 million customers, and seven million small businesses, the Guardian reports.

Ultra-secure hard drive ‘shatters on demand’

A new gadget from British drive maker Secure Drives forges off into Mission Impossible territory with a genuine, physical ‘self-destruct’ command which can be triggered from anywhere on Earth.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.