How To Make A Strong Password
August 12, 2016 | Security
People tend to hate computer passwords, that often nonsensical jumble of letters, numbers and special keystrokes said to be essential for digital security. The secret codes seem impossible to remember. It's why every login page has a "Forgot password?" life preserver. The struggle even has a name: Password rage. Now, a new standard is emerging for passwords, backed by a growing number of businesses and government agencies - to the relief of computer users everywhere. No longer must passwords be changed so often, or include an incompre...
Going On holiday? Why You Should Never Trust Your Hotel Room Safe
August 4, 2016 | Security
It’s important not to assume that leaving your valuables in a safe makes them completely secure. After forgetting the password to get into the storage box, a man rung up reception to get it unlocked. Worryingly, the help desk informed him that all he had to do was enter another password to open the safe. It wouldn’t be difficult for a thief to get their hands on any of the guests valuables, as Brad was informed that the default code that unlocks all of the hotel machines is simply 000000. Concerned by the hotel’s revelation, Brad deci...
Pokemon Go Is Collecting All Of Your Data
July 12, 2016 | Security
Millions of people are collecting Pokemon on the new app Pokemon Go while the developers are collecting their data. Since its initial release on Friday in New Zealand Pokemon Go has captured people's attention - along with a lot of its users' information. The developer Niantic Inc is a spinoff of Google-owner Alphabet and uses GPS in its users' smartphones to track all their movements. Niantic tracks where people go, when, how long they stayed for and keeps all of that information. If you logged into the game using your Google account...
Why Twitter Gave A Woman's Home Address To Her Cyberstalkers
June 9, 2016 | Security
This story begins with a woman named Renee, but we aren't using Renee's last name at her request. That's because Renee is the victim of cyberstalkers - and, thanks to Twitter, they now have her address. Since early last summer, when Renee began advocating publicly for childhood vaccination, a dedicated clique of Twitter trolls has hounded her every tweet. They've filmed nasty videos, defamed her to colleagues - even posted photos that suggest they've followed her on the street. But Renee was particularly irked when some of her stalker...
Untrustworthy Employees And How To Avoid Them
May 24, 2016 | Security
If you own or manage a business with employees, it can be hard to know that they’re trustworthy. It’s especially hard if you suspect that one of your employees is taking advantage of you. Our Private investigators are often called to investigate cases of employee fraud and dishonesty in businesses. You would like to think it wouldn’t happen to you, but if something doesn’t add up, you need to find out the truth. There are two situations where you are at risk of being defrauded by a bad employee, when you’re hiring someone new, and wh...
Israeli Firm 'Helped FBI Crack San Bernardino Gunman's Cell Phone Without Apple's Help'
April 1, 2016 | Security
An Israeli company helped the FBI in unlocking the iPhone used by one of the San Bernardino, California shooters, according to reports. Israel's Cellebrite, is a provider of mobile forensic software that says it does business with thousands of law enforcement and intelligence agencies, militaries and governments in more than 90 countries. An official source told NBC News that the company had helped. Neither the FBI nor Cellebrite has confirmed the reports. The FBI hacked into the iPhone used by gunman Syed Farook, who died with his w...
Financial Transactions With Suspected Terrorism Links On The Rise In NZ
March 8, 2016 | Security
Financial transactions thought to be linked to terrorism have almost doubled in the past two years. Information released by the police under the Official Information Act showed a rise from 21 cases in 2014 to 40 in 2015 and the latest figure was 24. The data did not show how much money was involved, where it was going or exactly why it was linked to terrorism. Transactions included an international wire transfer over $1000, anything more than $10,000 being transferred, people putting money through charities or religious organisations ...
The NYPD Has Secretly Been Spying On Cell Phones Since 2008
February 13, 2016 | Security
The New York Police Department has secretly tracked cell phones more than 1,000 times between 2008 and 2015, documents obtained by the New York Civil Liberties Union show. The documents, released only after an inquiry under the state's Freedom Of Information Law, or FOIL, reveal for the first time the NYPD owns and uses Stingrays. Stingrays, also known as cell-site simulators, are devices that mimic cell phone towers, then collect information from phones that attempt to connect to them. That information allows police to pinpoint a pe...
UK Should Prepare For Use Of Drones In Terrorist Attacks
January 11, 2016 | Security
Commercially available drones have the potential to be converted into flying bombs capable of hitting targets such as nuclear power stations or the prime minister’s car, a report by a security thinktank has warned. “Drones are a game changer in the wrong hands,” warns the lead author of the report by the Oxford Research Group’s Remote Control Project. The report, The Hostile Use of Drones by Non-State Actors Against British Targets, highlights concerns that “drones will be used as simple, affordable and effective airborne improvised e...
Your Masterlock Doesn't Really Lock Anything Up
December 22, 2015 | Security
He’s used plastic zip ties, bamboo sticks and even cat food cans to open the locks dangling from gym lockers and storage sheds across the US. Bill Johnson is now attracting a global following thanks to his YouTube campaign against Master Lock — offering a veritable how-to on ways to open its padlocks without a key. “Stay away from Master Lock,” Johnson warns as his online alter ego, Bosnian Bill, in a November video, after opening one of the company’s locks in a few seconds by simply tapping on it with a small brass hammer. The proble...








