Spring Savings
up to 25% discounts
by Steve Bell

Smart device apps riddled with security holes

After testing 100 mobile apps designed to control smart devices such as a thermostats, electrical blinds and baby monitors, security researchers Pradeo Lab concluded the majority of them have a raft of worrying vulnerabilities.

by Steve Bell

What is a backdoor?

The secret world of computer backdoors is one in which spooks access supposedly secure equipment and services, hackers plunder data and take remote control of computers, and network administrators innocently go about their business carrying out remote maintenance.

by Steve Bell

Malware bots and the nasty things they can do

Bots, short for Internet robots, are also known as spiders, crawlers, and web bots. Specifically, a bot is an application that performs an automated task such as telling you the weather or searching online.

by Steve Bell

Is your webcam being used to spy on you?

It’s easy to dismiss those who warn against the perils of webcam spying as conspiracy theorists that see malicious online threats in every line of code, every click of the mouse and every flickering screen.

We use cookies to ensure that we give you the best experience on our website. By continuing to browse, we are assuming that you have no objection in accepting cookies. You can change your cookie settings at any time.