Search Results: Blogs
1-15 of 71 results

Stop using passwords that are hard to remember but easy for computers to guess

A long string of memorable words is much more secure than a short set of random characters.

Malware

Published 16 April 2014

How does the Heartbleed bug work?

A visual guide to the Heartbleed threat.

Malware

Published 11 April 2014

Watch out for leprechaun viruses on St Patrick's Day

There is a history of viruses linked to the holiday.

Malware

Published 17 March 2014

The Russians are coming

Russian-language cybercrime community utilising internal currencies.

Malware

Published 17 February 2014

Please don't chop off my fingers

The story of my digital digits.

Malware

Published 27 January 2014

SPOILER: Ever wondered what all the computer coding means in films?

The code in Iron Man’s visor is actually for a Lego computer.

Malware

Published 14 January 2014

Guest Blog: Trapping malware in the sandbox

Threat emulation is a key new technique forpreventing zero-day and targeted attacks. Tom Davison of Check Point explains how this method delivers...

Malware

Published 20 December 2013

UK consumers putting mobile data at risk

Shoppers have no security installed on their mobile device.

Malware

Published 19 December 2013

Adobe still hasn't alerted me to security breach

Comforting that other companies have stepped in.

Malware

Published 28 November 2013

Ransomware and science fiction

A new virus is the latest example of real life copying fiction.

Malware

Published 22 November 2013

All fingers and thumbs

With the aid of biometrics, Duncan MacRae’s fingers can help him gain access to a host of nations and buildings.

Malware

Published 07 November 2013

Adobe passwords revealed

Are you amongst the clever folk who used 123456?

Malware

Published 06 November 2013

Guest blog: User and App centric security

Nick Bowman, F5 Networks, on the new set of challenges in the security landscape.

Malware

Published 05 November 2013

Afternoon infographic: PRISM is only a symptom

The causes of data breaches are shifting.

Malware

Published 01 November 2013

Halloween infographic

Spooky security statistics from Rapid7

Malware

Published 30 October 2013

1-15 of 71 results
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.