You might have noticed that Conficker (Downadup) is actually standing up rather well to all the attention it’s receiving at the moment....
CNN reported that there a new sleeper virus out there. http://www.cnn.com/2009/TECH/ptech/01/16/virus.downadup/index.html There is nothing sleepy about the Conficker worm, it is wide...
One of the security best practices is to back up your data regularly. This is sound advice as it helps mitigate the...
There are different techniques that can be used by a program to identify in which country it has been installed. It can...
This is bizarre, if slightly nostalgic. I spent a lot of time in the first half of this decade writing and presenting...
Many people in the US associate HIPAA with the rules required to protect medical data. It actually is a lot more than...
I know, the Twitter hack is old news, but poor passwords are still common. It is a pity because it really is...
Nigel Morris, of the UK’s “Independent” newspaper reported recently on new powers given to police in the UK and proposals to extend...
And finally… Don’t use cracked/pirated software! These are easy avenues for introducing malware into, or exploiting weaknesses in, a system. This also...
It occurs to me that I should make it clear that this “top ten” isn’t in any particular order. Like the other...
Don’t expect antivirus alone to protect you from everything. Use additional measures such as a personal firewall, antispam and anti-phishing toolbars, but...
If sensitive information is stored on your hard drive (and if you don’t have -something- worth protecting on your system, you’re probably...
[Update info moved to new blog post on 6th January] In deference to all those old enough to get a panic attack...
Speaking of SANS, the Internet Storm Center has more than once talked about problems with digital photo frames, and at Xmas did...
Don’t disclose sensitive information on public websites like FaceBook or LinkedIn. Even information that in itself is innocuous can be combined with...
Don’t trust unsolicited files or embedded links, even from friends. It’s easy to spoof email addresses, for instance, so that email appears...
Log on to your computer with an account that doesn’t have “Administrator” privileges, to reduce the likelihood and severity of damage from...
Further to my post of 25th December about the withdrawal of the CastleCops services, there’s a blog at Darkreading that includes more...
Lots of fuss was made about the paper presented at the Chaos Communication Congress in Berlin yesterday by Alexander Sotirov et al....
Here’s the second instalment of the “ten ways to dodge cyberbullets” that I promised you. Keep applications and operating system components up-to-date...
We’re closing in on the end of 2008 and about to start 7D9, or 2009 for those who do not speak hex....