Digital security


771 articles

How to create strong passwords (without driving yourself mad)

How to create strong passwords (without driving yourself mad)

How to create strong passwords (without driving yourself mad)

There are a few tricks to making passwords that will at least slow down cybercriminals - buying you time to reset your accounts if a list of encrypted passwords leak in a data breach.

Rob Waugh17 Jul 2013


The Home Campaign: overstaying its welcome

The Home Campaign: overstaying its welcome

The Home Campaign: overstaying its welcome

The Home Campaign is a malware campaign that uses a modified variant of Darkleech to direct visitors to the Blackhole exploit kit. We want to give a better idea of the size and extent of this campaign.

Sébastien Duquette02 Jul 2013


China has “mountains of data” on U.S. cyber attacks, top official claims

China has “mountains of data” on U.S. cyber attacks, top official claims

China has “mountains of data” on U.S. cyber attacks, top official claims

A top internet security official in China has said that his organization has “mountains of data” on U.S. cyber attacks against the country. Huang Chengqing, the director of the National Computer Network Emergency Response Technical Team Coordination Center of China (CNCERT), made the comments in the state-run China Daily newspaper, calling for greater cooperation between the two states on hacking.

Rob Waugh05 Jun 2013


China accuses U.S. of being “the real hacking empire” after Pentagon report

China accuses U.S. of being “the real hacking empire” after Pentagon report

China accuses U.S. of being “the real hacking empire” after Pentagon report

China has accused the United States of being, “the real hacking empire” after a Pentagon report which said for the first time that cyber attacks on the U.S. were “directly attributable” to Beijing.

Rob Waugh08 May 2013


Up to 600,000 gamers at risk as emails and other details stolen from online zombie game

Up to 600,000 gamers at risk as emails and other details stolen from online zombie game

Up to 600,000 gamers at risk as emails and other details stolen from online zombie game

Up to 600,000 gamers at risk as emails and other details stolen from online zombie game

Rob Waugh04 Apr 2013


Apple ID password and verification two-step plays on

Apple ID password and verification two-step plays on

Apple ID password and verification two-step plays on

Stepping up protection of the Apple ID falters as password reset bug emerges before two-step verification is fully implemented.

Stephen Cobb24 Mar 2013


Obama uses TV interview to raise cyber awareness

Obama uses TV interview to raise cyber awareness

Obama uses TV interview to raise cyber awareness

President Obama has used a TV interview to further raise public awareness of the growing cyber security threat against the United States.

Rob Waugh13 Mar 2013


Top celebrities and government officials financial details leaked online

Top celebrities and government officials financial details leaked online

Top celebrities and government officials financial details leaked online

The Associated Press reports that celebrities, including ashton Kutcher and Kim Kardashian, along with top government officials have had private financial information stolen and posted to a rogue website.

Rob Waugh12 Mar 2013


UK's new Cyber Security Champion announced

UK's new Cyber Security Champion announced

UK's new Cyber Security Champion announced

The winner of the 2103 UK Cyber Security Challenge, launched two years ago as part of a government and industry backed initiative to encourage people to choose a career in information security, has been announced.

Rob Waugh11 Mar 2013