Public Key Encryption with GnuPG
One of the most overlooked risks of using the internet is the fact that most of the time your data is as private as the writing on the back of…
One of the most overlooked risks of using the internet is the fact that most of the time your data is as private as the writing on the back of…
Research carried out by two security companies has provided information that most people will have already recognised - in the last week there has been a significant increase in spam…
Passwords are frequently thought of as an "outdated" method of security and numerous product vendors will tell you how they offer a much better solution that kind of works like…
Today the Information Commissioner's Office announced a data protection act breach at the Bay House School in Hampshire which placed data belonging to nearly 20,000 people at risk. Reading the…
In a situation resembling a variation on tiger kidnapping, there is news today of a situation in Australia where a woman spent 10 hours with a suspected explosive device strapped…
Cloud computing is frequently presented as the future of how will interact with our data. More and more systems are moving to the various service routes, from software (such as…
News reports are coming into today of a terrorist attack in Norway. It appears that a gunman opened fire on a youth conference on the island of Utoya, killing four…
According to a tweet by "AnonymouSabu" - apparently a hacker collective on twitter - the website of the Sun news paper has been hacked. The slightly more famous hacker collective…
Hot on the heels of Wordpress 3.2, a maintenance release update has been issued. As is normally the case, unless you have a strong reason not to, it is best…
Security is about protecting the things that are important to you. Most people know this. What matters is how you do your security. It is fairly well understood that if…
As part of our continuing effort to help raise security awareness and provide business with the tools to improve their own security posture, Halkyn Consulting has produced a security guide…
Previously we mentioned a news item that claimed the International Monetary Fund had been the victim of a "spear phishing" security breach. It seems that this is far from an…
Another day and another round of news headlines about the hacker collective calling itself LulzSec. Today there were two main headlines relating to the UK. The first, and possibly most…
Almost every business, what ever its size and function, handles sensitive data. This can range from a list of your customers and their addresses, to full-blown business intelligence systems that…
Identity theft is a genuine risk, for you, your employees, your family and your customers. It may not happen as often as some of the media reports claim, but it…