Tag Archives: Security

Are your emails secure?

      Comments Off on Are your emails secure?

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a protocol for sending digitally signed and encrypted messages. So far, so good. Unfortunately, if you use Microsoft Outlook to send secure emails, any set-up employing S/MIME may not be encrypted after all – leaving the email contents wide open to snoopers. The trouble… Read more »

Share

The smartphone – your new flexible friend

      Comments Off on The smartphone – your new flexible friend

Not content with managing almost every aspect of our daily life, it looks as if smartphones are poised to become our main method of paying for our purchases. Businesses are constantly striving to find new ways to make it easy for customers to pay, while at the same time reassuring… Read more »

Share

Exploit broker ups its payout rates for tip offs

      Comments Off on Exploit broker ups its payout rates for tip offs

Zerodium is an American information security company that buys premium zero-day vulnerabilities from security researchers and then reports the research, along with protective measures and security recommendations, to its corporate and government clients. As part of its newly-published menu of rewards, Zerodium has recently announced that it will be paying… Read more »

Share

Worrying shortage of cybersecurity staff

      Comments Off on Worrying shortage of cybersecurity staff

When it comes to choosing a career in the world of cyber, security seems to be a less attractive option than hacking – judging by the severe shortage of qualified cybersecurity recruits. Just as there were ‘two girls for every boy’ for Jan and Dean, according to anti-virus guru John… Read more »

Share

The simple way for SMEs to stay cybersafe

      Comments Off on The simple way for SMEs to stay cybersafe

By taking preventative measures, the world has largely wiped out diseases such as smallpox, polio and malaria. The next big challenge is to eradicate cyber crime. Almost four million cyber crime offences were committed in Britain last year, accounting for nearly 40% of all recorded criminal incidents. SMEs with finite… Read more »

Share

Shhh! Alexa can hear you

      Comments Off on Shhh! Alexa can hear you

Is your friendly Amazon Echo serving your every whim and need – or is it spying on you? A British researcher has found a simple way of using malware and an SD card to convert an innocent speaker into a secret bugging device. In a time where voice-activated digital assistants… Read more »

Share

How hackers can cache in

      Comments Off on How hackers can cache in

Information security specialist Omer Gil has come up with an ingenious method of conning a web server into exposing personal data through a caching attack. Any sites that use content delivery network (CDN) services are vulnerable to this new threat. Gil’s idea, showcased at Black Hat Conference, demonstrates how an… Read more »

Share

Google introduces new app vetting scheme

      Comments Off on Google introduces new app vetting scheme

In response to a number of recent phishing attacks, Google is beefing up its defences by unveiling a new ‘unverified app’ screen that instructs users and developers to tread carefully. This will replace the current ’error’ page that warns against opening dodgy apps and attachments. While users are still at… Read more »

Share

Keep tabs on your phone

      Comments Off on Keep tabs on your phone

The great smartphone dilemma is whether to opt for safe and boring or insecure and interesting. Anyone in possession of an all-singing, all-dancing mobile should make sure they are fully aware of its vulnerabilities and take preventative measures. Most people keep a treasure trove of valuable data on their phone,… Read more »

Share