Author
Rob Waugh
Rob Waugh
Independent Correspondent

Highlights of your career? Interviewing one of the team that broke the Enigma code.

What malware do you hate the most? The Love Bug - I was the guy who opened it.

Favorite activities? Testing smartphones (I often have three or more on the go).

When did you get your first computer and what kind was it? 1984, ZX Spectrum.

Favorite computer game/activity? World of Warcraft - but I gave up, and have been 'clean' for two years.

More Info

Webcam security – how to lock down the cameras in your home

Our tips will help you hacker-proof anything from baby monitors to surveillance cameras – and keep your home private.

Facebook hoax – how to tell instantly if a story is fake

Two-thirds of young people first learn about major news events via Facebook – but as cybercriminals cash in with hoax stories and links, it can be difficult to tell ‘real’ content from fake. Our tips can help.

Identity theft – six tips to help keep yours safe

Private data such as addresses and social security numbers can be just as valuable to cybercriminals as valid credit card details can be to thieves – if not more so. Lock yours down with our tips.

Gamer PCs – how to keep yours clean and mean

Gamers have become major targets for hackers – from large-scale attacks against gaming companies, to small-scale scams carried out via game chat channels. But a few easy security steps should help keep your precious rig at full speed – and safe.

Cyber Monday – 12 tips to help you shop safely online

Technology might evolve, but cyber gangs rely on tried-and-tested tactics. With a bit of care and attention, it’s easy to sort the genuine bargains from the too-good-to-be-true fakes.

Smart home security – how not to be dumb with your devices

It’s easy to imagine that ALL connected devices – from fridges to CCTV cameras – are a security nightmare, but there are simple, sensible steps you can take to lock these risks down.

Can e-cigarettes give you malware?

The long-term health effects of electronic cigarettes – or E-cigarettes – are still open for discussion – but the devices could harm your computer, at least if one report is to be believed.

Week in Security: Grief for gamers, Unicorn spotted – and America wakes up

Cybercriminals once again had gamers in their sights this week, with leaks of multiple account details and a new Steam scam – but there was good news in the form of upgraded security on Whatsapp, and dawning awareness on privacy.

Facebook scams – ‘Naked woman eaten by shark’ is latest bait

The latest salacious video – promising ‘Naked Woman Eaten by a Shark’ – is just one in a long chain of viral video scams spread via Faceboook.

More than half of British firms ‘would consider hiring hackers’

More than half of British firms would consider hiring computer hackers in the face of a severe skills shortage – and more than 50% of executives said that they would consider hiring an expert even if they had a criminal record

Wireless attacks against ‘air gapped’ targets are possible, Israeli team claims

A team of Israeli researchers has demonstrated a way to hack into an ultra-secure air-gapped network, install malware, and retreive information – without using hardware such as USB keys.

Footage from thousands of home webcams found streaming on Russian site

A Russian website is showing off hundreds of feeds of live webcam footage from inside homes and businesses, which have been accessed by hacking into people’s webcams, CCTV systems and monitors.

U.S. State Department shuts down entire email system after suspected attack

The U.S. State Department has shut down its entire unclassified email system after a suspected intrusion – and technicians are now working to beef up email security systems.

Steam gamers targeted with ‘free screensaver’ phishing scam

Gamers on the popular Steam gaming service have been targeted with phishing scams via the service’s popular Marketplace – with apparent ‘bargains’ offering a sting in the tail.

Apple Pay and security – what you need to know

Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses a boom in cardless payments – both from Apple’s own system, and rivals playing catch-up.

Google security – how to lock down your Google account

If you use Gmail as your ‘main’ email account – or rely on Google services such as Drive for work – it’s well worth revisiting Google’s Settings menus to give your Google security a boost.

Wearable tech and security – can watches help?

So far, wearable tech has been of interest mainly to fitness fiends – but a new generation of hi-tech wearables comes armed with built-in scanners, biometrics and even ‘three-factor security’. Can a watch really keep secrets?

Internet trolls – how to deal with online abuse

Most internet users have faced some kind of problems with internet trolls – and a new study has thrown light on who they are. We discuss how best to deal with the online pests.

Counter surveillance tech – can gadgets spy-proof your life?

Over the past few years, counter surveillance gadgets which might have been the preserve of secretive government departments a decade ago have suddenly hit mainstream shops – from Mission Impossible-stlye self-destructing drives to some rather eerie counter-surveillance masks.

Privacy online – what you can do (and what you can’t)

Many of us have moments when we need, or want, to be more private online – when searching for a new job, for instance, or when having a private business conversation.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.