Author
Rob Waugh
Rob Waugh
Independent Correspondent

Highlights of your career? Interviewing one of the team that broke the Enigma code.

What malware do you hate the most? The Love Bug - I was the guy who opened it.

Favorite activities? Testing smartphones (I often have three or more on the go).

When did you get your first computer and what kind was it? 1984, ZX Spectrum.

Favorite computer game/activity? World of Warcraft - but I gave up, and have been 'clean' for two years.

More Info

Five hacker movies that got things badly wrong

5 hacker movies that got computer security well off the mark.

Five alternatives to Bitcoin

Here’s a small selection of alternatives to Bitcoin – each of which has its own advantages. All of them share Bitcoin’s fundamental strengths, however – minimal or zero transfer fees, and freedom from traditional banking restrictions.

Nine bad botnets and the damage they did

Responsible for a great deal of the hacking, spamming and malware every day: here are some of the worst botnets of all time.

Internet of Things: a Security Timebomb?

Hailed as a panacea by those for whom the world cannot move quickly enough, the Internet of Things has been a long time coming. But is Internet of Things security up to scratch?

Is your valentine for real? Six signs you might be falling for an online dating scam

With Valentine’s Day nearly upon us, millions will be looking for love online. Here’s six online dating scams to look out for.

Common eBay scams and how to avoid them

Buying and selling on eBay can be great, but it can also be fraught with risk. Here are some of the most common eBay scams and how they can be avoided.

What are the alternatives to passwords?

Is it time for big companies – at the very least – to abandon weak password security? If so, what password alternatives are there?

Facebook turns 11 – what you need to know, and what do your likes say about you?

Facebook updated its privacy settings at the end of January. As Facebook turns 11 today, here’s what you need to know about the new settings and how they could affect you.

Are you being tracked? How to spot a tracking app on your phone

Tracking apps and spyware are a genuine risk, and an extremely unpleasant invasion of privacy for many. Here are our tips on how to recognize if you have a tracking app on your phone, and what to do about it.

6 WhatsApp Security Tips

Even though WhatsApp now encrypts all of its messages and data, it pays to be secure with your chats. Here are our top WhatsApp security tips.

Holiday security tips – booking online safely

With Christmas fast becoming a distant memory and the January blues setting in, thousands of us are turning our eyes to booking a holiday abroad. But the recent hacks at United and American Airlines show that hackers see the travel industry as fertile territory.

How can businesses save money on internet security in 2015?

A recent report from Piper Jaffray found that 75% of companies expected to increase their IT security spending in 2015, following a year of high-profile hacks and data breaches in 2014.

Facebook privacy – why statements about copyright don’t do anything

Facebook users around the world have reported the return of the network’s longer-lasting hoaxes – a legal disclaimer which allows users to regain copyright over their images and other content. Here’s why it doesn’t work.

Police close in on Bitcoin fraudsters who stole $370m in Mt Gox collapse

Police are closing in on thieves who stole Bitcoin valued at $370 million during the collapse of popular exchange Mt Gox – and just 1% of the theft is believed to be the work of outside hackers.

Sony execs turned to old BlackBerries from basement in wake of attack

Sony executives turned to old BlackBerries found in a basement in the firm’s California headquarters in, using SMS text messages and a ‘phone tree’ to communicate in the wake of the attack.

Nvidia breach – employee information leaks

Graphics card company Nvidia suffered a data breach in which private employee information was leaked, the company has revealed.

Facebook privacy – network faces court for ‘reading user messages’

Facebook is to face a class action lawsuit over ‘reading’ its user’s messages, a U.S. judge has ruled.

Biometrics – can your fingerprint be ‘copied’ from a normal photo?

Fingerprint biometrics are entering the mainstream as a security measure, with both Apple and Samsung relying on readers to secure their flagship phones – but biometrics may not be as secure as many believe.

Yik Yak – what security-conscious users need to know

It’s billed as the hottest new messaging app on the planet, and it’s rocketed into the top ten in the U.S. in just a year. But how safe are you on Yik Yak?

Webcam security – how to lock down the cameras in your home

Our tips will help you hacker-proof anything from baby monitors to surveillance cameras – and keep your home private.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
Copyright © 2015 ESET, All Rights Reserved.