Teenage cybercrime: How to stop kids from taking the wrong path
It’s never too late to prevent children from being dragged to the dark side and to ensure their skills are a force for good
Phil has been an IT journalist for over 16 years. He started out as a reporter on UK enterprise IT title IT Week and then Computing in 2005 and moved up to the role of News Editor before leaving to pursue a freelance career. Since then, Phil has written for titles including The Register, where he worked as Asia correspondent from Hong Kong for over two years, MIT Technology Review, SC Magazine, and others. In addition to contributing to WeLiveSecurity, he also writes for InfoSecurity Magazine, IDG Connect and a range of other IT news and feature sites.
It’s never too late to prevent children from being dragged to the dark side and to ensure their skills are a force for good
Phil MuncasterHow well retailers can manage the surge in cyberthreats may be crucial for their prospects in a post‑pandemic world
Phil MuncasterDon’t be the next victim – spot the signs of a faux romance in time and send that scammer ‘packing’
Phil MuncasterSome fraudsters may use low-tech tactics to steal your sensitive information – peering over your shoulder as you enter that data is one of them
Phil MuncasterShould you beware of wearables? Here’s what you should know about the potential security and privacy risks of your smartwatch or fitness tracker.
Phil MuncasterThink your email may have been hacked? Here are the signs to look for, how account takeover attacks commonly occur, and how to recover your account and avoid falling victim again
Phil MuncasterIs loyalty fraud on your radar? Here's why your hard-earned reward points and air miles may be easy pickings for cybercriminals.
Phil MuncasterAs you attempt to strike it rich in the digital gold rush, make sure you know how to recognize various schemes that want to part you from your crypto
Phil MuncasterFrom social engineering to looking over your shoulder, here are some of the most common tricks that bad guys use to steal passwords
Phil MuncasterBe alert, be proactive and break these 10 bad habits to improve your cyber-hygiene in the new year
Phil MuncasterBy spotting these early warning signs of identity theft, you can minimize the impact on you and your family
Phil MuncasterIt often pays to look a gift horse in the mouth – recognizing these types of gift card fraud will go a long way toward helping you stay safe from this growing threat not just this holiday season
Phil MuncasterReceiving a breach notification doesn’t mean you’re doomed – here’s what you should consider doing in the hours and days after learning that your personal data has been exposed
Phil MuncasterIt’s often said that data breaches are no longer a matter of ‘if’, but ‘when’ – here’s what your organization should do, and avoid doing, in the case of a breach
Phil MuncasterAre the days numbered for ‘123456’? As Microsoft further nudges the world away from passwords, here’s what your organization should consider before going password-free.
Phil MuncasterOrganizations that aim to pull ahead of the competition need to develop a strong security culture from top to bottom
Phil MuncasterEmployee use of unsanctioned hardware and software is an increasingly acute problem in the remote and hybrid work era
Phil MuncasterThere are various ways a departing employee could put your organization at risk of a data breach. How do you offboard employees the right way and ensure your data remains safe?
Phil MuncasterMisconfigurations of cloud resources can lead to various security incidents and ultimately cost your organization dearly. Here’s what you can do to prevent cloud configuration conundrums.
Phil MuncasterDiscover the best ways to mitigate your organization's attack surface, in order to maximize cybersecurity.
Phil Muncaster