This blog complements my book, The Essential Guide to Home Computer Security, to help you keep your home computers and smartphones secure.
Monday, 9 July 2012
Trojan Horse Found in the App Store
Watch Out: Trojan Horse Found in the iOS App Store: Kaspersky have reported a new malicious app on the Apple App Store and Google Play Store. The app's name is Find and Call, and it's the first time they report having seen a malicious app make it into Apple's App Store.
Monday, 2 July 2012
3 Ways Cyber Scams are Getting More Personal - and Social
Social media is allowing a more diverse range of scams than ever before. And according to this article, it's the perfect target for criminals - too many people are just used to sharing without ever thinking about security. There are 3 ways scammers are increasingly exploiting this vulnerability in people:
1) By putting malware in links that social media users are relaxed about clicking on;
2) By developing malware that appears to be part of a social media service and thereby can request, and capture, personal and financial data;
3) By using personal info from social media to target their attack and make it seem more credible.
1) By putting malware in links that social media users are relaxed about clicking on;
2) By developing malware that appears to be part of a social media service and thereby can request, and capture, personal and financial data;
3) By using personal info from social media to target their attack and make it seem more credible.
Friday, 15 June 2012
For 'Enterprise Security' read 'Home Computer Security'
Employers often find it difficult to raise the cyber
security awareness of their staff. One of the reasons for this is: what’s in it for them? What incentive is there for employees to act securely? But I think employers may be missing a trick. Corporate security awareness
training could include home computer security advice, so that staff see some personal benefit from the training. They may then take away a better understanding of security. There could be a win-win for
business, and home users, in this way.
Sunday, 3 June 2012
Ex MI5 chief gets laptop stolen at Heathrow airport
The report suggests that the laptop might have been left behind on a luggage trolley by the car park. But it can happen to anyone. Even an ex-MI5 chief can get their laptop stolen at Heathrow airport.
Monday, 28 May 2012
Smartphone security is heading for 'apocalypse'
Interesting overview of the vulnerabilities of mobile phone encryption leading to the view that we are moving to 'apocalypse' when it breaks down. And this doesn't even consider the software issues such as cyber attacks on smartphone operating systems, malicious apps, sharing of malware, rogue diallers etc. And a lot of these also have parallels with the PC boom in the 90s.
Smartphone security is heading for 'apocalypse'
Subscribe to:
Posts (Atom)