There are a number of telephone or vishing (voice phishing) scams around at the moment targeting people in order to gain access to financial information, bank accounts or computer equipment. These ...
The world of cyber-security is strewn with examples of major security vulnerabilities, many of which have led to costly and embarrassing security breaches. But where is the greatest security vulnerability, what ...
This is a question that security professionals the world over debate endlessly. Does compliance actually mean better security? The simple answer is that in and of itself, no, compliance does not ...
I have just read an article on the BBC News website about proposed new powers for school head teachers which will allow them to search for mobile phones and even check ...
Social Networking is the biggest thing to hit the internet since it began. The sheer numbers involved are staggering. If Facebook was a country it would be the 3rd largest in ...
If you’re working on a client site, in addition to obeying their rules and policies on information security here are Secure Thinking’s 10 Client Site InfoSec rules you should employ to ...
The subject of 3rd party “Apps” has raised its head again – this time on Google Android smart phones. Apps on smart phones and on social networking sites are becoming ever ...
There’s a new guy working in your office. You haven’t seen him around before and he keeps switching desks, using those of people who are out of the office, or work ...