You’ve doubtless heard about the major vulnerability which has hit Microsoft’s browser, and XP won’t be patched – so what action can you take?
We look at the way in which the Heartbleed attack operates – is it highly sophisticated and arcane? In a word, no.
Exactly how risky will it be to run XP going forward? We speak to a number of security experts to find out their opinions.
When it comes to social media, you need to strike the right balance between sharing enough, but not over-sharing or giving away too much personal info.
We’ve got some advice on that old chestnut, links in emails – the different varieties you might receive, and why you should never click on them!
We take a look at a selection of mobile security apps, from full suites to utilities that help with other aspects of security such as parental control.
A group of hotels have been found to follow a "finders keepers" rule when it comes to guests losing their valuable smartphones and laptops.
We’ve got some excellent advice on choosing a strong and memorable password – you’ll need at least one of these even if you use a password manager.
So which apps are the riskiest downloads? What’s that – games, you say? Actually, games don’t represent the biggest app threat…
We look at the most prevalent online threats that you might come across, and rank them in order of how dangerous they are.
Many dangers lurk on the Internet, from cyber-bullying to websites filled with dodgy content. Here are some ways you can keep your offspring safe online.
So you think you might have received a dodgy email attachment in your inbox? We’ve got some advice on what to do next.
Many folks don’t want to back their data up in the cloud for a variety of reasons, but don’t let fear stop you from accessing a very convenient backup medium.
If you suspect your email has been hacked, we detail the steps you can take to determine if this is indeed the case, and what action to take thereafter.
We’ve got some advice to help ensure your identity isn’t stolen, from tips on web forms through to browser security plug-ins.
It is possible for a virus to defeat a security product and evade detection. We look at your options in this scenario.
There are certain things you should never do while you’re on the net, and we point out five of the biggest missteps in this article.
We look at how you can avoid someone else hacking and controlling your Facebook account for their own dire purposes.
Here are some great tips for parents to ensure that their offspring have a safe and secure web surfing experience.
If your operating system, browser, or browser plug-ins aren’t kept bang up to date, you could be risking a world of malware hurt.
What are the three things which are critical to your safety online? We’ll tell you here, and offer our recommendations for the best security tools while we’re at it.
We look at how you can cover your web surfing tracks, from taking simple cookie-related measures through to using the open source tool TOR.
What’s the difference between a virus and a worm, exactly? Or adware and spyware? We go through the definitions of all types of malware.
If you’re not sure why you should avoid sending a tirade of abuse back to spammers telling them to leave you alone, we outline the very good reasons here.
Do you suspect one of your employees of embezzling? Spying on their PC may help you find out the truth, but it’s definitely not a matter you should enter into lightly.