Hunt for your devices with Prey

Imagine you are in the airport waiting for a flight when you look down only to discover that your laptop is missing. This isn’t a great thought, especially since many of us have important files and programs that we can’t afford to lose. The problem is, if your device has gone missing, the chances of […]

Twitter sees security breach

For many, social media is a deeply ingrained part of daily life. For companies it’s become an integral part of their marketing and communications strategy. Because of this, the security of these services is something users expect. 99% of the time. However, there are breaches that can cause trouble for users. It only took one […]

17 million UPnP devices at risk

As technology continues its creep into every aspect of our life, the number of Internet connected devices we use is also growing. This has led to an increase in the number and severity of security threats facing networks. It seems that almost every week a new security threat is uncovered. One of the latest can […]

Security flaws force many to cut Java

For as long as computers have been able to connect to the Internet, there have been security flaws and the two go hand-in-hand. Companies do their best to shore up security problems, and some do better than others. There’s one popular Internet based program that has had a slew of security issues in the past […]

Watch out for tech support phone scams

For users of Windows systems the threat of a security breach is an ever-present one that has many security experts constantly worrying. The thing is, many systems are secure enough from outside attacks, and many scammers know this. As a result, scammers have switched tactics and have taken to masquerading as Windows technicians, hoping to […]

Do you have a social media policy?

When it comes to security most businesses take adequate steps to ensure their networks and systems are secure from the majority of attacks. The major problem with this is that many don’t look beyond what they already do, and this is where security issues can harm them. One such security threat comes from social media. […]

Admin access to systems could be trouble

Security of technical systems and devices used in the office environment is an issue that is important to many companies. Businesses often go to great lengths to ensure that their systems are secure from external threats, yet often fail to take into account inner threats. One of the most common inner security threats is that […]

Ever wondered what mobile encryption is?

Security is a hot button issue, with nearly every company focusing on some form of security and many focusing on security related to the technology they use. This ensures company networks are secure from attack, and businesses often have drafted usage policies for employees to follow when using their computers. While this is a good […]

Sick of spam? So are we. But what is it?

Who likes Spam? There’s Spam and eggs (a classic), Spam and bacon and eggs, eggs bacon and Spam, or even Spam, Spam, Spam, Spam, baked beans, Spam, Spam and Spam. Sound like a bit too much Spam? Monty Python thought so in their 1970 comedy sketch which highlighted how Spam seemed to be everywhere. Spam […]