391 posts
All you need to know about the worrying popularity of Malvertising
Every morning, without fail, you log onto your computer and check your emails, read the news, and have a look at your social media accounts.…
WhatsApp calls: Questions over privacy as WhatsApp keeps register of activity
The undisputed leader in the western world for instant messaging, with over 900 million active users, WhatsApp is synonymous with smartphones and messaging. Despite this,…
How to avoid Efast Browser, the latest adware to hit Chrome
Another day, another malware to tackle. It seems that hackers are churning out new ways to trick us on a weekly basis as security researchers…
Google takes the fight to Ransomware
It’s becoming more and more common for malicious applications on Android to use this old form of attack. Just like their famous predecessors that went…
4 common errors that businesses make after a data breach
A few months ago on this blog we raised the basic points that you should think about when confronted with a cyberattack. Unfortunately the general…
Social Engineering techniques – What they are and How businesses can avoid them
Although it may be tempting to imagine hackers as being shy and socially inept types, whose only human interaction is via their computers, this…
10 careless errors that we keep making in IT security
You have read and reread numerous lists with tips on how to browse online safely, make online purchases, avoid your most intimate photos ending up…