Stop using passwords that are hard to remember but easy for computers to guess
A long string of memorable words is much more secure than a short set of random characters.
Published 16 April 2014
How does the Heartbleed bug work?
A visual guide to the Heartbleed threat.
Published 11 April 2014
Watch out for leprechaun viruses on St Patrick's Day
There is a history of viruses linked to the holiday.
Published 17 March 2014
The Russians are coming
Russian-language cybercrime community utilising internal currencies.
Published 17 February 2014
Please don't chop off my fingers
The story of my digital digits.
Published 27 January 2014
SPOILER: Ever wondered what all the computer coding means in films?
The code in Iron Man’s visor is actually for a Lego computer.
Published 14 January 2014
Guest Blog: Trapping malware in the sandbox
Threat emulation is a key new technique forpreventing zero-day and targeted attacks. Tom Davison of Check Point explains how this method delivers...
Published 20 December 2013
UK consumers putting mobile data at risk
Shoppers have no security installed on their mobile device.
Published 19 December 2013
Adobe still hasn't alerted me to security breach
Comforting that other companies have stepped in.
Published 28 November 2013
Ransomware and science fiction
A new virus is the latest example of real life copying fiction.
Published 22 November 2013
All fingers and thumbs
With the aid of biometrics, Duncan MacRae’s fingers can help him gain access to a host of nations and buildings.
Published 07 November 2013
Adobe passwords revealed
Are you amongst the clever folk who used 123456?
Published 06 November 2013
Guest blog: User and App centric security
Nick Bowman, F5 Networks, on the new set of challenges in the security landscape.
Published 05 November 2013
Afternoon infographic: PRISM is only a symptom
The causes of data breaches are shifting.
Published 01 November 2013
Spooky security statistics from Rapid7