Latest Posts

Router Vulnerabilities

Your home/small office Internet router is your gateway to the Internet. It is a combination of hardware, software and communication protocols that coexist in a complex system. As such, your router is subject to software and hardware vulnerabilities in much the same way as your PC or mobile device. Illustration 1 On 19 June 2020… Continue Reading →

COVID-19 Research by Kings College London

A study is being run by researchers at King’s College London into how the symptoms of the COVID-19 coronavirus develop and what this can tell us regarding how the virus attacks the body, vulnerable groups and how it spreads to quote a few of the outcomes.  You can read up about the study here.  One… Continue Reading →

UK Coronavirus Contract Tracing Update

This is an update to my blog Location Tracking, Your Privacy & COVID 19 Contact Tracing to bring this up to date with the recent developments in the UK. The UK were going to develop a COVID 19 Contact Tracing App using a hybdrid technology that was centralised and in which they owned the data… Continue Reading →

Windows 10 Feature Update 2004 Released

In May 2020 Microsoft released their latest feature update to Windows 10. This will be delivered through Windows Updates as a feature update to targeted devices in the short term and your device may be specifically blocked while drivers and other software (e.g. Anti Virus software) is updated. As with all new releases, there are… Continue Reading →

Android 11 Preview Released

This week (WC 7 June 2020) the first preview of Android 11 (the latest iteration in the Android smartphone operating system) was released for specific test handsets. This brings a number of security and privacy updates as well as some functional updates that you may either love or hate. Privacy Updates A number of privacy… Continue Reading →

Deep Fakes

Deep fake is a term given to a persuasive-looking but false video and audio files. Made using cutting-edge and relatively accessible AI technology, they purport to show a real person doing or saying something they did not. This can manifest itself in Hollywood films where a greenscreen special effect is used to put the actor… Continue Reading →

Anatomy of a Phish

I expect a lot of you have received an email or text that claims you have won a prize and you need to click a link to claim it. This is often unexpected and you don’t remember entering a competition to win the said prize. Maybe you have received an email from the Tax Authority… Continue Reading →

The Human Firewall

The first line of defence for any network to repel a cyber attack is often considered the security software on the perimeter of the network – namely the firewalls, and other monitoring software. While a properly configured security framework is essential for any company network, as well as home/small office network, the human element cannot… Continue Reading →

Loading…

Something went wrong. Please refresh the page and/or try again.

Follow US

Get new content delivered directly to your inbox. By subscribing we will assume you have read and agree to our Privacy Policy.

Create a website or blog at WordPress.com

Up ↑