Highlights of your career? Interviewing one of the team that broke the Enigma code.
What malware do you hate the most? The Love Bug - I was the guy who opened it.
Favorite activities? Testing smartphones (I often have three or more on the go).
When did you get your first computer and what kind was it? 1984, ZX Spectrum.
Favorite computer game/activity? World of Warcraft - but I gave up, and have been 'clean' for two years.
Harley says that scams and social engineering have been a constant in cybercrime – but in the past few years, some scams have got markedly more sophisticated, and more difficult even for a trained eye to spot.
Facebook updated its privacy settings at the end of January. As Facebook turns 11 today, here’s what you need to know about the new settings and how they could affect you.
Tracking apps and spyware are a genuine risk, and an extremely unpleasant invasion of privacy for many. Here are our tips on how to recognize if you have a tracking app on your phone, and what to do about it.
With Christmas fast becoming a distant memory and the January blues setting in, thousands of us are turning our eyes to booking a holiday abroad. But the recent hacks at United and American Airlines show that hackers see the travel industry as fertile territory.
A recent report from Piper Jaffray found that 75% of companies expected to increase their IT security spending in 2015, following a year of high-profile hacks and data breaches in 2014.
Facebook users around the world have reported the return of the network’s longer-lasting hoaxes – a legal disclaimer which allows users to regain copyright over their images and other content. Here’s why it doesn’t work.
Police are closing in on thieves who stole Bitcoin valued at $370 million during the collapse of popular exchange Mt Gox – and just 1% of the theft is believed to be the work of outside hackers.
Sony executives turned to old BlackBerries found in a basement in the firm’s California headquarters in, using SMS text messages and a ‘phone tree’ to communicate in the wake of the attack.
Facebook is to face a class action lawsuit over ‘reading’ its user’s messages, a U.S. judge has ruled.
Fingerprint biometrics are entering the mainstream as a security measure, with both Apple and Samsung relying on readers to secure their flagship phones – but biometrics may not be as secure as many believe.
It’s billed as the hottest new messaging app on the planet, and it’s rocketed into the top ten in the U.S. in just a year. But how safe are you on Yik Yak?
Our tips will help you hacker-proof anything from baby monitors to surveillance cameras – and keep your home private.
Two-thirds of young people first learn about major news events via Facebook – but as cybercriminals cash in with hoax stories and links, it can be difficult to tell ‘real’ content from fake. Our tips can help.
Gamers have become major targets for hackers – from large-scale attacks against gaming companies, to small-scale scams carried out via game chat channels. But a few easy security steps should help keep your precious rig at full speed – and safe.
Technology might evolve, but cyber gangs rely on tried-and-tested tactics. With a bit of care and attention, it’s easy to sort the genuine bargains from the too-good-to-be-true fakes.
It’s easy to imagine that ALL connected devices – from fridges to CCTV cameras – are a security nightmare, but there are simple, sensible steps you can take to lock these risks down.
Many of us have moments when we need, or want, to be more private online – when searching for a new job, for instance, or when having a private business conversation.
Google, Facebook, Twitter and AOL have joined forces to stamp out fake tech support services where customers are fooled into calling bogus technical support lines, where they are encouraged, not to fix their comptuer, but to install malware – or give away details crucial for identity theft.
At 15 payment machines dotted around the Swedish city of Lund, people can buy items without needing a card – or a phone equipped with a “Near Field” chip. All that’s required are the correct veins.
Microsoft announces a zero-day security flaw in many versions of Internet Explorer, the first to hit Windows users since XP support was terminated on April 8, potentially crippling IE on XP systems.
Hackers targeting sensitive information or stealing from retailers work at such speed that customers often notice data breaches first – and for the first time, cybercriminals are ‘teaming up’ with spies, according to a new report.
Man challenges hackers to break into accounts after complaining Heartbleed was “overhyped” – and has online life destroyed in minutes.
The full scope of the Heartbleed bug came to light in a series of reports by researchers and white-hat hackers, with some claiming a billion smartphones may be at risk, as well as a statement allegedly from the US government over its use of the bug.
The Heartbleed bug – a flaw in an encryption technology used to protect major websites including Yahoo – has left a huge amount of private data at risk – and internet giants are scrambling to find fixes for a problem which could leave customer data exposed to criminals.
Networking giant Cisco has launched a “grand challenge” to invent a security solution for the “internet of things” – a broad term used to describe connected devices from industrial equipment to cars to smart home appliances.
A large majority of routers used in small offices are plagued with security vulnerabilities – with up to 80% of small office/home office models having critical security weaknesses, according to a survey by Tripwire.
Couples who have been in a long-term relationship indulge in risky online behaviour, such as sharing passwords for online accounts, with two-thirds of married couples sharing at least one password, a new study by Pew Internet has found.
Nearly two-thirds of employees – 63% – use personal email to transfer work files, potentially leaving workplaces exposed to hacks against their accounts – and more than half of employees regularly transfer files by insecure channels.
Over the past two years, many online services have started to offer ‘two-factor authentication’ – an extra security measure which often requires a code from an app, or an SMS message, as well as a password. Our guide explains how, why and when to use ‘2FA’.
Attackers involved in the Target breach, which led to the theft of 40 million debit and credit card details late last year, broke into the retailer’s network via a heating and air-conditioning contractor, according to a new report.
The 2014 threat trends report from ESET’s global network of cybersecurity experts centers on three key trends, the first and foremost being digital privacy, the others being threats to mobile devices, and new, hi-tech malware targeting PCs and other devices in the home.
Children indulge in highly risky behavior online – with nearly one in five 9-11 year olds having physically met strangers they encountered online. Others use false identities – with some under-10s pretending to be 25.
A breach which has leaked personal data for two million Vodafone Germany customers has ben claimed to be the work of an insider, according to Vodafone.
“Passwords are done at Google,” said Heather Adkins, Google’s information security chief – and said that “the game is over” for start-ups relying on passwords as the chief method to keep users secure.
These days cybercriminals will use phone calls, SMS messages, emails, fake apps – and even couriers – in an effort to get your money. The key to staying safe is to recognize behavior that isn’t quite “right” – and catch phishers and fraudsters in the act.
Sign up to our newsletter
The latest security news direct to your inbox
Add this code to your site