Millions of innocent people are victims or potential victims of scams each year around the world. Sadly these scams are ever-changing and just as you think you know the latest scam another one pops up. Here are some scam busting websites that can prevent you being the next victim.
Over the years, although heard of, I have never fallen victim to a GumTree scam. I recently sold my home and before I move to my new home I need to go into rented accommodation for 3 months. With 3 weeks before the big move, I placed a little advert on Gumtree to see if anyone had any short-term lets available. Amazingly on waking the next morning, I had received several text messages from different people.
The following infographic, based on Arxan’s automotive IoT page, details the vulnerabilities of the connected car. By the year 2020, it is estimated that 75% of all cars will have internet connectivity. Taking this on board this leaves the door open for hackers who will exploit this technology.
Malware and unwanted software goes hand-in-hand with the Internet. As technology has advanced so have the techniques to gain access to your computer, network and your money.
With Adware, crapware, DoS, pharming, malware, ransomware, trojans and much more we can’t be far off filling the A-Z of glossary of cybercrime definitions.
However if you are a little security conscious here are a few tools that may be able to help you.
Welcome to this week’s WOW Weekly. Dell got into a little hot water when a rogue root certificate was found on its systems. Xbox 360 celebrated its 10th Birthday. WordPress.com release a handy new piece of software for the Mac and the Raspberry Pi Zero is looking rather yummy.
Welcome to WOW Weekly.TalkTalk made big news last week when a massive cyber attack compromised the details of all it’s customers. TalkTalk have since announced the attack wasn’t as bad as first feared but will this be enough for the customers that want out! From Warty Warthog to Wily Werewolf Ubuntu is 11 years old! First released in 2004 the open source Linux distribution has gracefully transformed into the modern operating system we see today.
Arxan and iThreat Cyber Group have published The Application Security report detailing how the illegal reproduction and distribution of copyrighted material (piracy) on the web is growing rapidly. Over 1000 sites have been analyzed over the past 3.5 years are part of the dark web which is not indexed by standard search engines. 50 are in the business of distributing pirated releases.
As bizarre as this title sounds I haven’t taken up knitting as a hobby. Recently I was called by my friend whose Windows Vista computer had shut down on her and refused to restart. Being slightly curious I paid her a visit to be greeted with a computer that had gone into hyper hibernation mode. A simple long press of the power button turned it off and boy what was I greeted with when I restarted it.
WordPress is the most popular used blogging/CMS software which is why I guess it is used by millions of websites around the world. Unfortunately, there are some very bad people out there that will try their hardest to exploit any weaknesses in your blog. If you look through your logs you can guarantee that someone, or something, like bots, for example, has tried to gain access to your site by attempting to access your login page, registration page or even your forgotten password page. Of course, you can never completely eradicate the bad boys but with a good knowledge of WordPress security can help you protect your site as much as possible.
No doubt you will have heard of spam, phishing, viruses and trojans by now. After all they are constantly a threat to our security and it is the main reason why we have firewalls and anti-viruses on our computers. Threats are not entirely computer based though you may be also subject to telephone calls from people pretending to be from your ISP or even from Microsoft themselves! Be aware of the scammer!