Phil Muncaster

Phil Muncaster

IT Journalist


Phil has been an IT journalist for over 16 years. He started out as a reporter on UK enterprise IT title IT Week and then Computing in 2005 and moved up to the role of News Editor before leaving to pursue a freelance career. Since then, Phil has written for titles including The Register, where he worked as Asia correspondent from Hong Kong for over two years, MIT Technology Review, SC Magazine, and others. In addition to contributing to WeLiveSecurity, he also writes for InfoSecurity Magazine, IDG Connect and a range of other IT news and feature sites.


123 articles by Phil Muncaster

Scams

Crypto scams: What to know and how to protect yourself

Crypto scams: What to know and how to protect yourself

Scams

Crypto scams: What to know and how to protect yourself

As you attempt to strike it rich in the digital gold rush, make sure you know how to recognize various schemes that want to part you from your crypto

Phil Muncaster12 Jan 20224 min. read


How To

5 ways hackers steal passwords (and how to stop them)

5 ways hackers steal passwords (and how to stop them)

How To

5 ways hackers steal passwords (and how to stop them)

From social engineering to looking over your shoulder, here are some of the most common tricks that bad guys use to steal passwords

Phil Muncaster05 Jan 20225 min. read


Digital Security

Breaking the habit: Top 10 bad cybersecurity habits to shed in the new year

Breaking the habit: Top 10 bad cybersecurity habits to shed in the new year

Digital Security

Breaking the habit: Top 10 bad cybersecurity habits to shed in the new year

Be alert, be proactive and break these 10 bad habits to improve your cyber-hygiene in the new year

Phil Muncaster03 Jan 20225 min. read


How To

5 warning signs your identity has been stolen

5 warning signs your identity has been stolen

How To

5 warning signs your identity has been stolen

By spotting these early warning signs of identity theft, you can minimize the impact on you and your family

Phil Muncaster14 Dec 20214 min. read


Scams

5 common gift card scams and how to spot them

5 common gift card scams and how to spot them

Scams

5 common gift card scams and how to spot them

It often pays to look a gift horse in the mouth – recognizing these types of gift card fraud will go a long way toward helping you stay safe from this growing threat not just this holiday season

Phil Muncaster07 Dec 20214 min. read


How To

What to do if you receive a data breach notice

What to do if you receive a data breach notice

How To

What to do if you receive a data breach notice

Receiving a breach notification doesn’t mean you’re doomed – here’s what you should consider doing in the hours and days after learning that your personal data has been exposed

Phil Muncaster22 Nov 20215 min. read


Digital Security

When the alarms go off: 10 key steps to take after a data breach

When the alarms go off: 10 key steps to take after a data breach

Digital Security

When the alarms go off: 10 key steps to take after a data breach

It’s often said that data breaches are no longer a matter of ‘if’, but ‘when’ – here’s what your organization should do, and avoid doing, in the case of a breach

Phil Muncaster11 Nov 20215 min. read


Business Security

Passwordless authentication: Is your company ready to move beyond passwords?

Passwordless authentication: Is your company ready to move beyond passwords?

Business Security

Passwordless authentication: Is your company ready to move beyond passwords?

Are the days numbered for ‘123456’? As Microsoft further nudges the world away from passwords, here’s what your organization should consider before going password-free.

Phil Muncaster08 Nov 20214 min. read


Business Security

Putting cybersecurity first: Why secure-by-design must be the norm

Putting cybersecurity first: Why secure-by-design must be the norm

Business Security

Putting cybersecurity first: Why secure-by-design must be the norm

Organizations that aim to pull ahead of the competition need to develop a strong security culture from top to bottom

Phil Muncaster26 Oct 20214 min. read