How to


173 articles

Tips for protecting against sextortion

Tips for protecting against sextortion

Tips for protecting against sextortion

It seems like every few days there is a new story involving teenaged girls being tricked or blackmailed into sending compromising pictures of themselves to their tormenters. For the last few years, the FBI has been warning that this crime – “Sextortion” – is on the rise.

Lysa Myers17 Mar 2014


Five ‘new friends’ to avoid like the plague on social networks

Five ‘new friends’ to avoid like the plague on social networks

Five ‘new friends’ to avoid like the plague on social networks

Befriending the wrong person on Facebook can hand a criminal the tools for an identity theft attack - and on LinkedIn, talking to the wrong ‘recruiter’ can lead to disaster.

Rob Waugh10 Mar 2014


How can we as patients secure our medical data?

How can we as patients secure our medical data?

How can we as patients secure our medical data?

When someone says “data privacy” most people think about the information that is available on sites like Google and Facebook, or stored away in some marketing database. But when it comes to very private information, there are few things most of us would be more horrified to find floating around on the Internet than our medical data.

Lysa Myers04 Mar 2014


Smells phishy? New email scams - and why smartphone users need to stay alert

Smells phishy? New email scams - and why smartphone users need to stay alert

Smells phishy? New email scams - and why smartphone users need to stay alert

Phishing is unique among cyber attacks - it doesn’t rely on weaknesses in computer software, or new vulnerabilities - it relies, initially at least, on human gullibility. Our guide offers advice on how to avoid the latest scams - and why tablet and smartphone users need to stay alert.

Rob Waugh28 Feb 2014


How can doctors practice better health information security?

How can doctors practice better health information security?

How can doctors practice better health information security?

Did you know that medical data on 20,000 people may be exposed to abuse today? As a healthcare practitioner, you may not be aware of the value of the data in your care, but criminals certainly are.

Lysa Myers19 Feb 2014


Two-factor authentication: What is it - and why do I need it?

Two-factor authentication: What is it - and why do I need it?

Two-factor authentication: What is it - and why do I need it?

Over the past two years, many online services have started to offer ‘two-factor authentication’ - an extra security measure which often requires a code from an app, or an SMS message, as well as a password. Our guide explains how, why and when to use '2FA'.

Rob Waugh11 Feb 2014


Make it stop! How to cleanse your PC of unwanted adware (and 'badware')

Make it stop!  How to cleanse your PC of unwanted adware (and 'badware')

Make it stop! How to cleanse your PC of unwanted adware (and 'badware')

‘Adware’, software which delivers unwanted adverts, isn't as scary as some malware, but ESET's analysis of Win32/Boaxxe shows that 'malicious' adware is becoming increasingly hi-tech and stealthy. Our guide will help you clean your machine - and see fewer unwanted ads.

Rob Waugh21 Jan 2014


Attention Shoppers! Top tips for defending your accounts against card fraud

Attention Shoppers! Top tips for defending your accounts against card fraud

Attention Shoppers! Top tips for defending your accounts against card fraud

Read how to protect yourself if you've been shopping with credit or debit cards (and who hasn't?). As the scope of the latest cyber crime spree expands beyond Target and Neiman Marcus, malicious software is suspected.

Lysa Myers14 Jan 2014


Target breach expands: what does this mean?

Target breach expands: what does this mean?

Target breach expands: what does this mean?

Target's 2013 data breach is expanding in scope and scale, requiring additional vigilance on the part of shoppers to protect their accounts and their identity.

Lysa Myers10 Jan 2014