17 million UPnP devices at risk

As technology continues its creep into every aspect of our life, the number of Internet connected devices we use is also growing. This has led to an increase in the number and severity of security threats facing networks. It seems that almost every week a new security threat is uncovered. One of the latest can […]

Security flaws force many to cut Java

For as long as computers have been able to connect to the Internet, there have been security flaws and the two go hand-in-hand. Companies do their best to shore up security problems, and some do better than others. There’s one popular Internet based program that has had a slew of security issues in the past […]

Watch out for tech support phone scams

For users of Windows systems the threat of a security breach is an ever-present one that has many security experts constantly worrying. The thing is, many systems are secure enough from outside attacks, and many scammers know this. As a result, scammers have switched tactics and have taken to masquerading as Windows technicians, hoping to […]

Do you have a social media policy?

When it comes to security most businesses take adequate steps to ensure their networks and systems are secure from the majority of attacks. The major problem with this is that many don’t look beyond what they already do, and this is where security issues can harm them. One such security threat comes from social media. […]

Admin access to systems could be trouble

Security of technical systems and devices used in the office environment is an issue that is important to many companies. Businesses often go to great lengths to ensure that their systems are secure from external threats, yet often fail to take into account inner threats. One of the most common inner security threats is that […]

Ever wondered what mobile encryption is?

Security is a hot button issue, with nearly every company focusing on some form of security and many focusing on security related to the technology they use. This ensures company networks are secure from attack, and businesses often have drafted usage policies for employees to follow when using their computers. While this is a good […]

Sick of spam? So are we. But what is it?

Who likes Spam? There’s Spam and eggs (a classic), Spam and bacon and eggs, eggs bacon and Spam, or even Spam, Spam, Spam, Spam, baked beans, Spam, Spam and Spam. Sound like a bit too much Spam? Monty Python thought so in their 1970 comedy sketch which highlighted how Spam seemed to be everywhere. Spam […]

Risks of unrestricted access to Internet

Freedom is something many take for granted, especially when it comes to the Internet. We tend to think that countries that block certain sites on the Internet, like China and their ‘great firewall’ are infringing on basic rights. While blocking sites and access might seem pernicious, there is some benefit that comes from it, especially […]

Windows 8 breaks common security issues

Security issues seem to follow cycles. An exploit or security weakness is found in an operating system and all of a sudden, there’s tons of hackers taking advantage of it. Then, the OS developers and security companies develop and implement a fix and things die down for a few weeks, only to have another exploit […]

My computer has a Trojan? What's that?

Imagine this: it’s almost Friday, you’re scheduled to go out of town for the next two weeks on your first vacation in over three years. You wake up Friday morning with a sore throat, by Friday afternoon you are a mess. Viruses aren’t fun, they essentially render you useless, so you can imagine that’s why […]