How suppliers of everyday devices make you vulnerable to cyber attack – and what to do about it

A simple USB stick can wreak havoc on your business’ IT systems.

Hackers stole $172 bn. from nearly one billion consumers in 2017

People are way too overconfident that they won’t fall victims to cybercrime, report says.

How social media might put your private data at risk

You’ve probably heard some of the headlines: eBay hacked; Apple hacked etc. It’s infuriating when your private records, which you shared with a company you trust, get breached. But it’s often easy to lose sight of the fact that nowadays it’s not only companies that get hacked – it’s normal, nine to five, credit card holding individuals that get hacked too. Cybercriminals use all sorts of methods to spoof millions of twitter or facebook accounts and extract private information they can later use to steal your identity, extort you or hack other accounts. As such, we should all be a lot more responsible. Here’s a brief infographic made by the Digital Guardian which shows how oversharing on social media can be harmful and some practical tips on how to protect your data.

Hackers find a way to hijack Siri and control your phone from a distance

Combining machine learning and data analytics, Siri – the personal assistant for millions of Apple users – is a very powerful tool. Simply by voicing commands, Siri listens and obeys, whether you want to know how many calories are in your soda can or how many planes are flying above your head this very instant. But what if someone commanded Siri without your permission? A group of ethical French hackers recently showed it’s possible to hijack Siri from up to 16 feet away using hardware that can fit in a backpack and satisfy any whim.

How has the Portrayal of Hackers Changed over Time?

What image does the word ‘hacker’ conjure up? University geeks creating online chaos for their own amusement? A criminal gang stealing millions from non-savvy tech users? Or an anti-capitalist anti-hero wreaking havoc on multinational corporations? Throughout the history of tech, the hacker has been all of these things, and more. Here’s a quick look at how the image of hackers

Truly random numbers might be generated with quantum physics

Does flicking a dice really render a random face? The answer would be no. The dice is governed by large-scale conventional physics and its motion, and thus final position can be determined. You can’t tell where it lands just by looking at it thwirl, of course, but the fact remains it’s not random, and neither is any current computing system