Top Stories Security
- A Complete IT Security Approach Summarised In Nine Pictures
- Scan Your WordPress Themes And Plug-Ins For Suspicious Code
- What Would The Tech Requirements For Metadata Retention Be?
- We Don't Have Enough Data About Metadata Plans
- Why We're Bad At Dealing With Insider Security Threats
- How Budget Cuts Increased Australian Cyber-Security Risks
Computer users everywhere are looking at the USB stick sat next to their computer this week with trepidation. Many are now wondering if this trusted friend has turned against them now that cybersecurity experts say they’ve found a massive flaw in the very make up of these devices. It seems the humble USB drive can easily be used to compromise basic security principles in your machine.
WordPress has a lot going for it, including a flexible, open platform the encourages users to develop plug-ins and themes that make it even better. That same benefit, however, invites more nefarious parties to craft malicious code and slip it into free content. While prevention is always the best option, it doesn’t hurt to install a plug-in or two that can detect and alert you to suspicious code.
The number of physical robberies on banks has fallen dramatically in recent years, but the amount of money banks are losing through electronic methods has rocketed.