Google’s new cloud Wallet – is it secure?

Earlier this month Google made some fundamental changes to the way in which Google Wallet operates. The main difference is that the ‘active’ part of payment has been shifted from the handheld device to Google’s servers; that is, the cloud.

Read More >>

Steps To Increase Your Smartphone Security

This is a guest post by Lucille J Cronk.The increasing use of smartphones and the reliance placed on it by smartphone users has made them the targets of many malicious activities. Their enormous storage capacity has given relief to our brains in trying…

Read More >>

Is Your Mobile Device Hacker-Proof?

This is a guest post by Alyse.If it’s connected to the Internet, it can be hacked. For years, this was mainly a concern to PC users and IT guys, but anything that achieves mainstream usage and market share will eventually attract black hat types. From …

Read More >>

DDoS and the collateral damage of hacktivism

Hacktivism cuts both ways. The biter gets bit, and a war evolves. Where there is war, there are weapons. And where there are weapons, there is collateral damage. There is a hacktivist war around Julian Assange, between his detractors and his defenders …

Read More >>

Tesco to be investigated by the ICO

Tesco’s online security practices have been much questioned and criticized by security commentators over recent weeks. Now it appears that the Information Commissioners office is listening and acting, with reports that it will investigate.

Read More >>