- Four Things I've Learned Using A Standing Desk
- What You Need To Know About Microsoft .NET Core 1.0
- Which Streaming Service Has The Best Movies?
- Should We All Be Having Two Sleeps Per Day?
- How To Keep Your Mobile Staff's Phones And Laptops Secure
- How To Get Through The Workday When It Feels Like The World Is A Mess
There’s a lot of talk about encryption in the IT scene but how many people who aren’t in the industry actually know how the technology works? Mozilla wants to raise the awareness of encryption in the minds of the general public with Codemoji, an online game that teaches players about ciphers with emoji. That’s so fetch! Here’s how you can play the game.
Computer security has become big business, namely because the number of cybersecurity threats plaguing consumers and organisations have increased dramatically in the last few years. Cybercriminals are exceptionally creative and are constantly developing new malware to wreak havoc on computer systems, steal valuable data or worse. This SciShow video lists five of the worst computer viruses in history.
In the preview version of iOS 10, which was released recently at the Apple Worldwide Developer Conference (WWDC), the kernel has been found to be unencrypted. Previous versions of iOS all featured an encrypted kernel, so for Apple to open iOS 10 up like this is a big deal and allows security researchers to take a deeper look inside the operating system to expose potential bugs. Some security pundits have claimed this move makes iOS less secure. Here’s what you need to know.
Two-factor authentication (2FA) makes logging onto web services much more secure but it can also be a pain in the neck as it adds an extra step to the sign in process. Usually this involves typing in verification codes that you have to retrieve from an app on your phone. Google is attempting to simplify 2FA with a new feature for its online services called Google Prompt. Here’s what you need to know.
Security is a big issue, but it has taken a surprisingly long time for technology to help make it better. Fortunately, there are now a range of options available that make locks a whole lot smarter. And it’s not just for your home either – digital locks range from deadbolts, to padlocks and even USB drives.
Recently, I caught up with a friend who works in IT security and the topic of data breaches came up in conversation. He said it used to be hard to convince stakeholders in an organisation about the costs of data breaches; brand damage is difficult to quantify in dollars. But thanks to major data leakage incidents from the likes of Sony and Telstra in recent years, protection of digital information is now being taken seriously. A new report by the Ponemon Institute looks closer at the hard costs associated with data breaches and examines what methods organisations can adopt to reduce that cost. Read on to find out more.
Data breaches don’t just happen to large enterprises; the smaller end of town is often targeted by cybercriminals. While a big company may be able to ride out the brand damage done by a data breach, small businesses may not be so lucky. Which is why small business owners need to take the proper precautions to ensure customer data is kept safe. Here are some steps they can take.
Accounting for over one billion smartphone sales last year, Android is by far the most common operating system. It’s no surprise then that the OS is a prime target for malware and compromised security. While Google is very active in making Android safer, there are also a range of third party apps available. Read on to find out how to improve your security.
Cybercriminals are a resourceful bunch but underground marketplaces selling hacking tools are making it even easier for them to conduct their nefarious businesses. One of these marketplaces is xDedic, where you can find almost anything for attackers to launch attacks on unsuspecting individuals and organisations, including 70,624 compromised servers selling for as little as $US6 each. A portion of those servers are from Australia.