Phil Muncaster

Phil Muncaster

IT Journalist


Phil has been an IT journalist for over 16 years. He started out as a reporter on UK enterprise IT title IT Week and then Computing in 2005 and moved up to the role of News Editor before leaving to pursue a freelance career. Since then, Phil has written for titles including The Register, where he worked as Asia correspondent from Hong Kong for over two years, MIT Technology Review, SC Magazine, and others. In addition to contributing to WeLiveSecurity, he also writes for InfoSecurity Magazine, IDG Connect and a range of other IT news and feature sites.


118 articles by Phil Muncaster

Scams

Borrower beware: Common loan scams and how to avoid them

Borrower beware: Common loan scams and how to avoid them

Scams

Borrower beware: Common loan scams and how to avoid them

Personal loan scams prey on your financial vulnerability and might even trap you in a vicious circle of debt. Here’s how to avoid being scammed when considering a loan.

Phil Muncaster26 Mar 20246 min. read


Privacy

A prescription for privacy protection: Exercise caution when using a mobile health app

A prescription for privacy protection: Exercise caution when using a mobile health app

Privacy

A prescription for privacy protection: Exercise caution when using a mobile health app

Given the unhealthy data-collection habits of some mHealth apps, you’re well advised to tread carefully when choosing with whom you share some of your most sensitive data

Phil Muncaster19 Mar 20245 min. read


How To

How to share sensitive files securely online

How to share sensitive files securely online

How To

How to share sensitive files securely online

Here are a few tips for secure file transfers and what else to consider when sharing sensitive documents so that your data remains safe

Phil Muncaster13 Mar 20244 min. read


Critical Infrastructure

Election cybersecurity: Protecting the ballot box and building trust in election integrity

Election cybersecurity: Protecting the ballot box and building trust in election integrity

Critical Infrastructure

Election cybersecurity: Protecting the ballot box and building trust in election integrity

What cyberthreats could wreak havoc on elections this year and how worried should we as voters be about the integrity of our voting systems?

Phil Muncaster12 Mar 20244 min. read


Scams

Top 10 scams targeting seniors – and how to keep your money safe

Top 10 scams targeting seniors – and how to keep your money safe

Scams

Top 10 scams targeting seniors – and how to keep your money safe

The internet can be a wonderful place. But it’s also awash with fraudsters preying on people who are susceptible to fraud.

Phil Muncaster06 Mar 20245 min. read


Social Media

10 things to avoid posting on social media – and why

10 things to avoid posting on social media – and why

Social Media

10 things to avoid posting on social media – and why

Do you often take to social media to broadcast details from your life? Here’s why this habit may put your privacy and security at risk.

Phil Muncaster26 Feb 20245 min. read


Digital Security

Deepfakes in the global election year of 2024: A weapon of mass deception?

Deepfakes in the global election year of 2024: A weapon of mass deception?

Digital Security

Deepfakes in the global election year of 2024: A weapon of mass deception?

As fabricated images, videos and audio clips of real people go mainstream, the prospect of a firehose of AI-powered disinformation is a cause for mounting concern

Phil Muncaster13 Feb 20245 min. read


Business Security

The buck stops here: Why the stakes are high for CISOs

The buck stops here: Why the stakes are high for CISOs

Business Security

The buck stops here: Why the stakes are high for CISOs

Heavy workloads and the specter of personal liability for incidents take a toll on security leaders, so much so that many of them look for the exits. What does this mean for corporate cyber-defenses?

Phil Muncaster08 Feb 20245 min. read


Business Security

Assessing and mitigating supply chain cybersecurity risks

Assessing and mitigating supply chain cybersecurity risks

Business Security

Assessing and mitigating supply chain cybersecurity risks

Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective supplier risk management

Phil Muncaster25 Jan 20245 min. read