California was the first US state to require new smartphones to have a built in Kill Switch. If the phone is stolen the owner can log into their user account online and lock the phone with a message appearing on it reporting it as lost/stolen. If the phone isn't recovered the phone can be "bricked". Bricking wipes the phone and makes it unusuable.

Can Kill Switches stop Smartphone Theft

The intention of the Kill Switch is deter smartphone theft but an article from the Wall Street Journal shows it has had mixed results. In Austin, Oakland and San Francisco thefts have dropped between 11% &

Can Kill Switches stop Smartphone Theft?

California was the first US state to require new smartphones to have a built in Kill Switch. If the phone

These questions have been and will be answered by thousands of online articles. The Internet is full of advice on how users can protect themselves against potential cyber threats. However, it appears that many regular users have not properly prioritising their security practices.

How secure is your data

This understanding comes from a new research done by Google. The company has conducted a study to compare the best online safety practices of regular users to the ones of security experts. It shows that there is a big discrepancy in security practices.

For example, security experts have named software updates as the top online safety practice

How secure is your data? how do you protect yourself?

These questions have been and will be answered by thousands of online articles. The Internet is full of advice on

Cloudmarks threat report for Q2 2015 reveals some interesting trends about spam. There are big players in Spam, 14% of all spam Emails in the UK come from one IP in Scotland. When big players get taken down it can quickly transform the spam landscape.

Who are the big players in Spam

Spam is becoming more sophisticated. Numerous email providers send SMSs as a way of forwarding emails. Spammers have abused this to spam phones since it's cheaper to send spam emails than spam text messages.

The report goes into detail about scams targeting other groups such as fake resumes/CVs sent to small businesses. The report

Who are the big Players in Spam?

Cloudmarks threat report for Q2 2015 reveals some interesting trends about spam. There are big players in Spam, 14% of

The Israeli security company Zimperium found a gaping hole in the Android software — one that would let hackers break into someone's phone and take over, just by knowing the phone's number.

Got an Android smartphone

The Attack named Stagefright, arrives in a modified file delivered in an unremarkable MMS, which can bypass Android security to execute remote code and potentially allow access to files, storage, cameras and microphones.

Unlike phishing attacks, the user does not need to open the file for it to take effect and may not even notice it. “A fully weaponised successful attack could even delete the message before you see

Got an Android Smartphone? Be afraid.

The Israeli security company Zimperium found a gaping hole in the Android software — one that would let hackers break into

The London based whistle-blower site Sarawak Report has been blocked in Malaysia after reporting on a series of bribery and finacial mismanagement allegations linked to the Prime Minister of Malaysia, Najib Razik.

Malaysian Government blocks Whistle-blower Website

While censorship is nothing new in Malaysia. The Government had promised not to censor the internet in the 1990s as a way of attracting foreign investment.

Mayalsia has strict censorship of almost all media platforms. Malaysia was listed as a country "under surveillance" in the "enemies of the internet" report published by Reporters Without Borders. Despite this the internet is the main platform of free discussion and expressing

Malaysian Government blocks Whistle-blower Website

The London based whistle-blower site Sarawak Report has been blocked in Malaysia after reporting on a series of bribery and