Phil Muncaster

Phil Muncaster

IT Journalist


Phil has been an IT journalist for over 16 years. He started out as a reporter on UK enterprise IT title IT Week and then Computing in 2005 and moved up to the role of News Editor before leaving to pursue a freelance career. Since then, Phil has written for titles including The Register, where he worked as Asia correspondent from Hong Kong for over two years, MIT Technology Review, SC Magazine, and others. In addition to contributing to WeLiveSecurity, he also writes for InfoSecurity Magazine, IDG Connect and a range of other IT news and feature sites.


152 articles by Phil Muncaster

How to share sensitive files securely online

How to share sensitive files securely online

How to share sensitive files securely online

Here are a few tips for secure file transfers and what else to consider when sharing sensitive documents so that your data remains safe

Phil Muncaster13 Mar 20244 min. read


Election cybersecurity: Protecting the ballot box and building trust in election integrity

Election cybersecurity: Protecting the ballot box and building trust in election integrity

Election cybersecurity: Protecting the ballot box and building trust in election integrity

What cyberthreats could wreak havoc on elections this year and how worried should we as voters be about the integrity of our voting systems?

Phil Muncaster12 Mar 20244 min. read


Top 10 scams targeting seniors – and how to keep your money safe

Top 10 scams targeting seniors – and how to keep your money safe

Top 10 scams targeting seniors – and how to keep your money safe

The internet can be a wonderful place. But it’s also awash with fraudsters preying on people who are susceptible to fraud.

Phil Muncaster06 Mar 20245 min. read


10 things to avoid posting on social media – and why

10 things to avoid posting on social media – and why

10 things to avoid posting on social media – and why

Do you often take to social media to broadcast details from your life? Here’s why this habit may put your privacy and security at risk.

Phil Muncaster26 Feb 20245 min. read


Deepfakes in the global election year of 2024: A weapon of mass deception?

Deepfakes in the global election year of 2024: A weapon of mass deception?

Deepfakes in the global election year of 2024: A weapon of mass deception?

As fabricated images, videos and audio clips of real people go mainstream, the prospect of a firehose of AI-powered disinformation is a cause for mounting concern

Phil Muncaster13 Feb 20245 min. read


The buck stops here: Why the stakes are high for CISOs

The buck stops here: Why the stakes are high for CISOs

The buck stops here: Why the stakes are high for CISOs

Heavy workloads and the specter of personal liability for incidents take a toll on security leaders, so much so that many of them look for the exits. What does this mean for corporate cyber-defenses?

Phil Muncaster08 Feb 20245 min. read


Assessing and mitigating supply chain cybersecurity risks

Assessing and mitigating supply chain cybersecurity risks

Assessing and mitigating supply chain cybersecurity risks

Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective supplier risk management

Phil Muncaster25 Jan 20245 min. read


Virtual kidnapping: How to see through this terrifying scam

Virtual kidnapping: How to see through this terrifying scam

Virtual kidnapping: How to see through this terrifying scam

Phone fraud takes a frightening twist as fraudsters can tap into AI to cause serious emotional and financial damage to the victims

Phil Muncaster18 Jan 20244 min. read


Is Temu safe? What to know before you ‘shop like a billionaire’

Is Temu safe? What to know before you ‘shop like a billionaire’

Is Temu safe? What to know before you ‘shop like a billionaire’

Here are some scams you may encounter on the shopping juggernaut, plus a few simple steps you can take to help safeguard your data while bagging that irresistible deal

Phil Muncaster17 Jan 20245 min. read