Blog

IT security predictions for 2016

Online security has probably never been such a hotly debated subject as it was in 2015. From recent numerous high-profile attacks on Sony and others, to this year’s leaking of data stolen from the extramarital-affair-facilitating website Ashley Madison website, have pushed cyber security firmly into the spotlight. So what can we expect from 2016? Experts […]

Twitter warns about cyber attacks

Earlier this month, social media platform Twitter alerted a number of its users to the fact that their accounts may have been hacked into by something, or someone, known as a “state-sponsored actor.” While a warning of this kind is certainly not unprecedented – for some time now, both Facebook and Google have also been […]

Google and the art of safe mobile browsing

With the vast majority of end users turning to Google as their search engine or default browser of choice, it comes as no surprise to learn that the company takes security seriously. But in a perpetually changing landscape where anti-virus and anti-malware tools are constantly chasing their tails in order to stay up to date […]

Did you book that night at the hotel’s site?

Whether you travel a lot or just a little, you’ve probably gone online to book a hotel stay. Sometimes you might find a travel comparison site gets you the best deal. Other times, you might book directly at a hotel’s website — maybe to earn points for the company’s reward program, or because you have some special requests for your stay.

Call me maybe?

School’s out and your kids have days overflowing with fun and free time. You might be at the amusement park concessions while they’re riding the SuperVomitron Adventure Ride. Or maybe they’re at the pool bellyflopping with friends.

Public Wi-Fi Networks

Whether in a hotel or airport across the world, or in the coffee shop just down the street, chances are you’ve used free Wi-Fi hotspots. While convenient, they’re often unsecure. So how can you reduce your risk? Encryption — having your information scrambled into code — is key to staying secure online.

Is your phone a prized possession?

Let’s be honest: I spend more time playing games on my smart phone than talking on it. Our phones have become our family photo albums, personal gaming systems, calendars, encyclopedias, navigators, and instant messengers. If you can think of an activity, there’s probably an app for it.

A Text Message Mess

Let me set the scene: your friend John is rushing to get his daughter from school and his son to the soccer field, and he still needs to stop at the grocery store because there’s nothing in the fridge. In the midst of this everyday madness, he gets a text message from Google with a verification code.