Here we discuss what a remote code execution vulnerability is, how it works and why they are do dangerous. The developers of the software you use – for example your operating system, word processor or your Internet browser – are always on the lookout for software bugs. Those software bugs include software vulnerabilities that could […]
What is a phishing scam? Jargon buster
Our jargon buster section moves to phishing. What is it, what does it mean and how do you make sure you don’t fall for such a scam? A phishing scam is a broad term used to refer to any scam where a cyber-crook contacts a victim pretending to be someone they are not in order […]
Hacker tries to poison water supply of Florida city
Authorities are looking for a cyber crook who attempted to poison the water supply of a city in Florida. Oldsmar in Florida is consistently rated as one of the safest places to live in the state of Florida, but all that could have changed if an unknown computer hacker had their way. According to staff […]
Zero Day Vulnerabilities, Patches & Exploits. Jargon Buster
When you see a typical computer security headline such as “exploit targets zero-day vulnerability in Chrome. Patch now!” pop up on your screen, you may not understand some of the terminology. It’s not as complicated as it sounds once those definitions are explained in plain English. Our jargon buster helps put these terms into context. […]
Beware of phishing scam messages & emails from NHS about vaccine
Have you received an email, chat message or SMS message claiming to be from the NHS asking you to click a link to book your vaccine appointment? There’s a pretty high chance that it’s a scam. Cyber crooks are not the type of people to let a global pandemic go to waste, and they’ve set […]
Email scams blackmail victims with “compromising” webcam footage
Imagine the scenario. You get an email from an unknown sender. The email claims to be from a computer hacker, and they say they’ve managed to gain access to your webcam and have been covertly spying on you for days, even weeks. Not only that, but they’re spied on you visiting adult websites, and recorded […]
What to do if someone clones your Facebook account
We explain what to do if someone clones your Facebook account and impersonates you on the social networking platform. Facebook cloning is one of the most popular types of scams on the Internet’s largest social networking. It happens when a crook creates a new Facebook account, but they use your name and your profile picture. […]
What is ransomware and how do I avoid it?
We discuss the type of malware known an ransomware, what it does and how to avoid it. Malware comes in all shapes and sizes, and some types of malware are much more destructive than others. On the most severe end of that scale is ransomware, which is one of the most prolific and dangerous types […]
3 important Facebook privacy settings most people don’t use
We take a look at three important privacy settings on Facebook that most people don’t use and explain why they’re important. Facebook seems like a maze of settings, and the social network’s attempts to simplify everything never quite seems to work. It should be a “given” that everyone should use the “friends only” setting applied […]
2 million credit cards stolen from restaurant chain amid malware attack
The parent company that controls restaurants Planet Hollywood, Buca di Beppo, Earl of Sandwich, Chicken Guy!, Mixology and Tequila Taqueria has revealed a 10 month data breach affecting over 2 million of their customers who may have had their payment information stolen when eating at one of their outlets. Security researchers at KrebsOnSecurity notified Italian […]