This week is National Health IT Week, and you may be wondering – what is the best way to observe this occasion? While planning for catastrophe may not seem the most celebratory activity, this week is a great occasion to start or review your organization’s risk assessment.
Archives - September 2014
A poll has found that more than half (61%) of Americans want a ‘right to be forgotten’ from search engines such as Google, as the European Union passed into law earlier on this year.
This week offered a lesson in how cybercriminals follow the news, and time their attacks to dupe the unwary - with several different attacks aimed at iPhone fans, in the week where Apple unveiled its iPhone 6.
This Thursday, September 18, is the biggest day in Scottish political history, as the country votes on whether it should become independent from the United Kingdom - but an ESET security expert has warned cybercriminals could strike.
The dangers of clicking on links in eBay scam postings were highlighted after a fake posting advertising iPhones linked to a phishing site designed to steal usernames and passwords for the site.
With iOS 8, you can - for the first time - switch your Safari browser's search engine to alternatives such as DuckDuckGo. Find out why you might want to and, in fairness, why you might NOT want to...
Facebook scams tend to crop up in the run-up to a big Apple launch with around the same regularity as big Apple launches themselves. This week’s iPhone 6 launch is no exception.
Gamers have reported losing millions of dollars to hackers running customised 'Grand Theft Auto V' software which allows them to steal weapons, loot money, and even make people blow up in their own apartments.
Planning your 2015 budget? Forecasting 2015 sales? Don't forget a plan to survive "adverse events" from hurricanes to viruses, virtual and medical. This recorded webinar will help you get started with business continuity management or BCM.
Printer giant Canon is to provide a security fix “as quickly as is feasible” after a researcher exploited vulnerabilities in one of its wireless PIXMA products to run the classic shoot ‘em up game Doom on its colour display.
Pirates beware: free ebooks available online can be used to hack into Amazon accounts via the retail giant's ‘Manage Your Kindle’ page, used to deliver ebook files to Kindle readers.
Online criminals are spamming out messages claiming that invoices are overdue. But attached to the emails are .ARJ files containing a malicious payload - don't allow your computer to become infected.
British internet users opening a spam email are three times more likely to be facing a malicious URL than users in the US, thanks in part to a wave of highly targeted financial malware.
This week, American chain Home Depot admitted its systems had been breached, Gmail users got a fright, and a series of videos showed leaks in Android chat apps. Meanwhile, Facebook freaked out the world.... again.
A young man who got an email from Facebook ‘identifying’ him via Facebook tag in a series of photographs which turned out to be his mother as a young woman, says the incident “opens the door to larger and more difficult questions.”
A strain of malware which previously targeted banks has turned its attention to users of the popular Customer Relationship Management (CRM) software Salesforce, used by 100,000 organizations worldwide.
Some five million people who used their Gmail address as a user name had their passwords published by someone who apparently thinks that's a cool thing to do. Changing you Gmail password now is a good idea.
The sad truth is that scammers and fraudsters don't have any conscience, and are prepared to do anything if it might net them a rich reward. So it's no surprise to see them taking advantage of the downing of Malaysia Airlines flight MH17 over Ukraine.
Bitcoin’s mysterious creator, who goes by the pseudonym ‘Satoshi Nakamoto’, could be about to have his identity made public, after a series of emails from the address that has been his only point of contact with the world since 2011.
The blame game rages on in the wake of Celebgate and massive payment card hacks like Home Depot and Target, as though criminals were not the only people responsible for nude photo leaks and data theft.