The digital entropy of death: link rot

Hot on the heels of a grim blog about digital death comes…another blog about digital death. Except in this case, the recently deceased would be the links that tie the web together, otherwise known as link rot. Link rot is a weird thing. Say I blog for Puppy Chow and I write an article about the best dog shows. For one of my examples, I link to an article with the URL … [Read more...]

Investors concerned about smartphone addiction; Apple responds with new webpage

Hot on the heels of an open letter from investors urging Apple to do more to protect children from smartphone addiction, the tech giant has recently dedicated a page on their website to families. The “Families” page, which can be accessed at apple.com/families, contains tools parents can use to set restrictions on devices accessible to their kids, manage in-app purchases, keep track of … [Read more...]

A cure for the common cold call: freeze them out

The phone rings and it’s a number I don’t recognize. That’s enough to bring my mood down a few degrees. It shouldn’t, but unfortunately experience has taught me that at least 95 percent of the calls from numbers that are “private” or that I don’t have an account name stored for on my phone are so-called cold calls. A cold call is an unsolicited visit or telephone call made by someone trying … [Read more...]

The digital entropy of death: what happens to your online accounts when you die

Unless you’re planning on having your mind jammed inside some sort of computer chip, eventually mortality will catch up and you’re going to have to work out what you’ll do with all of your online accounts. When it’s time to shuffle off this mortal coil, you might, theoretically, be slightly annoyed if someone is using your dormant accounts to spam viagra or fake Twitter … [Read more...]

International Women’s Day: Women in tech share their stories

From the #metoo movement to Oprah’s Time’s Up speech to the women’s marches on cities throughout the word—it’s been a banner year for women’s rights. And on this International Women’s Day, we wanted to do more than pay lip service to the changes in feminist dialogue. After all, tech is an industry with a well-deserved reputation for being a boy’s club. But … [Read more...]

The state of Mac malware

Mac users are often told that they don’t need antivirus software, because there are no Mac viruses. However, this is not true at all, as Macs actually are affected by malware, and have been for most of their existence. Even the first well-known virus—Elk Cloner—affected Apple computers rather than MS-DOS computers. In 2018, the state of Mac malware has evolved, with more and more threats … [Read more...]

Building an incident response program: creating the framework

In part one of our series, our overview of Building an incident response plan, we discussed what regulations organizations will need to meet in order to address incident/breach response protocols laid out in the EU’s General Data Protection Regulation (GDPR). This week, we’ll talk to you about steps to take to actually create your company’s incident response program. An incident response (IR) plan … [Read more...]

Human Factor Podcast: Jenny Radcliffe and Chris Boyd

A little while ago, I was invited to take part in Jenny Radcliffe’s Human Factor Podcast. With 44 episodes strong (and counting!), Jenny spends an hour or so talking at length with her guests who are professional investigators, security advocates, all-round educators, tireless consultant/conference organisers, and many more besides. In Episode 41, you’ll hear me talk about: [00:01:00]: … [Read more...]

How to protect your computer from malicious cryptomining

Noticing that your computer is running slow? While sometimes a telltale sign of infection, these days that seems doubly true. And the reason is: malicious cryptomining. So, what, exactly, is it? We’ll tell you how bad this latest malware phenomenon is for you and your computer, plus what you can do about it. Definition Malicious cryptomining, also sometimes called drive-by mining, is when … [Read more...]

How to build an incident response program: GDPR guidelines

In today’s computing world, it is not a matter of “if” an organization will get compromised, but “when.” That’s why, in addition to the European Union’s General Data Protection Regulation (GDPR) going into effect this May, many organizations need to have a robust incident response program to ensure the safety of their customers’ and employees’ data. Incident response programs need to cover a wide … [Read more...]