Why you should tell Siri to stop listening from your iPhone’s lockscreen

Most of us fear having our passwords compromised when we imagine being hacked - but real-life attackers can do plenty of damage with far less sensitive information. Case in point: The ease with

Published on: November 18th, 2016 Eric Emin Wood

Phishing scam that hooked Clinton’s campaign chief a cautionary tale for businesses

Frequently overlooked in the ongoing hullabaloo over Hillary Clinton campaign chair John Podesta's leaked emails and whether they will have an impact on the U.S. first lady-turned-senator-turned-secretary-of-state-turned-presidential candidate's chances of being elected is

Published on: October 31st, 2016 Eric Emin Wood

One in five Macs harbour PC malware

A recent security scan of 100,000 Apple Macs found that almost three per cent were infected with Mac-capable malware including the recent Flashback Trojan, security company Sophos has reported. All told, 2,700 machines

Published on: April 25th, 2012 ITBusiness Staff

Twitter attack was part of ‘massively coordinated’ campaign

With Twitter back in action with degraded service – after yesterday's distributed denial of service (DDoS) attack – speculation is rife about what caused the incident.The DDoS assault had a mild impact on

Published on: August 7th, 2009 Joaquim P. Menezes

Spam, bam, no thank you ma’am – Twitter and sultry spam attacks

Computer security blogger Graham Cluley felt pretty popular when young brunettes began inviting him to view pictures and videos of them posted on the Web.The chief technology consultant at U.K.-based security vendor Sophos

Published on: October 20th, 2008 Brian Jackson

Five data leak plugs that could save your company millions

You wouldn’t think that losing a USB memory stick could cost your company millions of dollars of lost contracts, but that’s exactly what happened to PA Consulting in the UK.That USB key happened

Published on: September 15th, 2008 Brian Jackson