Loading page

Windows 10 Can Automatically Turn Wi-Fi Back On After A Few Hours

When you turn off Wi-Fi on your Windows laptop, you probably don’t want to turn it off forever. Yet that’s what Windows will assume until you tell it differently. In Windows 10, however, you can finally specify that you only want to turn it off for a little while.

Oracle Issues 253 Security Patches Across 76 Products

Oracle’s latest quarterly security update contains 253 patches for 76 of its enterprise products including databases, operating systems, Java and networking components. Among the security bugs that the update addresses, 15 of them are rated critical, some of which allow for remote exploitation by attackers without authentication in Java Standard Edition (SE) and Oracle’s database offerings. Here’s what you need to know.

China's Quantum Satellite Could End Data Breaches For Good

China recently launched a satellite into orbit with a unique feature: it has the ability to send information securely, not with mathematical encryption but by using the fundamental laws of physics. China will be the first country to achieve this feat, and it marks a milestone in the development of quantum technologies.

Ransomware Using Windows Script Files On The Rise

There has been a dramatic increase in ransomware attacks that use Windows Script File (WSF) attachments in emails. Here’s what you need to know.

Data Surveillance Is All Around Us And It's Going To Change Our Behaviour

Enabled by exponential technological advancements in data storage, transmission and analysis, the drive to “datify” our lives is creating an ultra-transparent world where we are never free from being under surveillance. Increasing aspects of our lives are now recorded as digital data that are systematically stored, aggregated, analysed, and sold. Despite the promise of big data to improve our lives, all encompassing data surveillance constitutes a new form of power that poses a risk not only to our privacy, but to our free will.

IT Shouldn't Be Solely Responsible For Dealing With Insider Threats

An organisation can put a swathe of security products in place to protect against external threats, but if there’s a person working from the inside to steal information, those digital walls are basically useless. That’s the nature of insider threats; the human element can be unpredictable and difficult to fight against.

Traditionally, it’s an IT department’s responsibility to deal with insider threats, given information is predominantly stolen through the use of technology. But high-profile security expert Keith Lowry, who was tasked with investigating Edward Snowden, believes that IT shouldn’t be solely responsible because it undermines the human element of insider threats.

Worried Your Emails Might Be Spied On? Here's What You Can Do

We live in a post-Edward Snowden world, in which US tech companies have been accused of complicity in mass surveillance by the US National Security Agency (NSA). One recent allegation is the claim that Yahoo scanned hundreds of millions of emails at the NSA’s request. We don’t truly know how much or how often this is happening within the companies that host millions of people’s email accounts.

10 Steps To Avoid Falling Victim To An Email Phishing Scam

One of the most popular ways for cybercriminals to steal personal information is by using email phishing scams. Cybercriminals often use this method of attack to trick employees from large organisations into clicking onto malicious links so they can gain access to corporate networks that contain valuable data. Here are 10 tips on how to avoid becoming a email phishing victim.

Trump Vs Clinton: Three Key Moments From The Second Debate

Donald Trump and Hillary Clinton faced off onstage today for the second US parliamentary debate — watch the entire heated exchange here. We asked three scholars from the university where the debate was held to pick a key quote from the evening and tell us why it was important. Here are their choices…

This Infographic Shows The Common Ways Scammers Try To Phish Your Account

Chances are if your email or social media account has ever been compromised, you accidentally gave your credentials to the scammers yourself. The most common way to infiltrate an account is called phishing, in which people trick you into handing over your login info to false websites that look legitimate.

Loading page