Earning Frequent Faker Points

Earning Frequent Faker Points

It’s confession time – I fly a lot. It’s one of the parts of my job that is both a blessing and a curse. I’ve been fortunate enough to see some lovely parts of the world as well as spend nights in some rather dodgy places, and have had my fair share of radiation thanks to travelling near the upper realms of the atmosphere.

Nyetya ransomware: what you need to know

Nyetya ransomware: what you need to know

Nyetya, a variant of the Petya ransomware, is spreading across businesses all over the world. Although it shares the same qualities as WannaCry — a ransomware deemed ‘one of the worst in history’ — many cyber security experts are calling it a more virulent strain of malware that could cause greater damage to both small and large organizations.

Don’t become a statistic of this new ransomware attack!

Don’t become a statistic of this new ransomware attack!

It seems that almost every week there’s another ransomware attack warning hitting the news channels. Some of these blow out quite quickly, but others are set to become legend.

The latest ransomware doing the rounds has been called “NotPetya” – this name is to distinguish it from a similar attack (Petya) which hit back in March but is an entirely different strain of software.

Does the CIA have access to your router?

Does the CIA have access to your router?

There are an exhausting number of cyber security threats to watch out for, and unfortunately you need to add another to the list. A recent leak from the CIA proves that routers are one of the weakest links in network security.

The Wikileaks CIA documents

For several months, the notorious website famous for leaking government data has been rolling out information it obtained from the Central Intelligence Agency.