Data loss

Fear of blackmail after RAF loses sensitive personal data

Read more in my article at Naked Security.


1 sec read

Bad news – it’s child’s play for anyone to recover your deleted Twitterings

Following last night’s discussion about British TV celebrity Jonathan Ross accidentally revealing his personal email address on Twitter (and how, despite his attempts to delete the Tweet, it’s still available for anyone to read) I’ve found out about an online service which makes it even easier to find those Tweets that all of us would


14 sec read

Jonathan Ross email goof highlights Twitter security issue

Read more in my article at Naked Security.


1 sec read

34% of resold hard drives contain personal data, study reveals

Researchers found that a disturbing number of hard drives sold on auction websites and at computer fairs contain sensitive information.


6 sec read

Hackers demand $10 million ransom after wiping patient data

Read more in my article at Naked Security.


1 sec read

Twitter security breach exposes accounts to hackers

Read more in my article at Naked Security.


1 sec read

Meet Sophos at Infosec in London

Read more in my article at Naked Security.


1 sec read

Salma Hayek’s email account is hacked

Read more in my article at Naked Security.


1 sec read

Teen hacker who made fake 911 calls punished

Read more in my article at Naked Security.


1 sec read

Real estate agents accused of hacking into rival’s account

Read more in my article at Naked Security.


1 sec read

Australian PM targeted by Chinese hackers?

Read more in my article at Naked Security.


1 sec read

Data leakage double time

Read more in my article at Naked Security.


1 sec read

GhostNet: Who is really behind it?

Read more in my article at Naked Security.


1 sec read

Stop staff plugging their body parts into your PCs

Read more in my article at Naked Security.


1 sec read

Do you use the same password for every website?

Read more in my article at Naked Security.


1 sec read

Spotify users warned of password security breach

Read more in my article at Naked Security.


1 sec read