This blog complements my book, The Essential Guide to Home Computer Security, to help you keep your home computers and smartphones secure.

Monday, 5 March 2012

Is this the youngest hacker ever?

Yesterday, my 4 year old daughter cracked my wife's PIN on the Wii fit. She turned around from the screen to look at us and said 'mummy, is your number XXXX?' I could see from the display that she was 'in'. It was absolutely hilarious and I was in stitches!

Wednesday, 29 February 2012

New Mac malware exploits Java bugs, steals passwords

A quite sophisticated password-stealing malware on Macs. It would seem to be a drive-by download using Java bugs to get itself installed. Security updates should by now be blocking it, but it just goes to show that users can't be complacent about security, even on the Mac.

Monday, 20 February 2012

Geo-tracking can give away your photo locations

To keep your photo locations private make sure you turn off GPS tracking of photos in the "settings" on your smart phone. Location data can be embedded in the photos and easily accessible if, say, the photos are posted online.
Geo-tracking can give away your photo locations

Privacy shouldn't be an after-thought

There are a lot of privacy stories around at the moment especially in relation to social media. In information (cyber) security it is accepted practice to undertake a risk assessment, a key part of which is the potential impact of a security event. Unfortunately in both security and privacy those who feel the impact, the victims, are not necessarily those who perpetrate the loss. So there is insufficient economic incentive for those taking risks with our personal data to do it well. For me there are at least 3 arguments in favour of Privacy Impact Assessments (PIAs) which are proposed as a way forward:
1) To redress this balance and encourage more investment in privacy protection;
2) To provide guidance and help to organisations;
3) To ensure 'due diligence' is performed;
Of course if 'due diligence' becomes box ticking, or PIAs are seen as bureaucratic obstacles then these benefits may not be realised. Ultimately what we want to encourage is 'privacy by design' and this can only be achieved if the right risk analysis is performed ab initio.

A Useful Review of 3 Free Bootable Rescue Discs

Important recovery tools - extremely useful
A Useful Review of 3 Free Bootable Rescue Discs