Malware 101 – A Pocket Guide

This post is a general round up of the various types of malware that is in circulation today. Typical types of malware are: BackdoorsKey Loggers Ransom Ware Root Kits Trojan HorsesViruses WipersWorms. This can also include social engineering methods, which are often used to get the first foothold in installing some form of malware. Lets... Continue Reading →

Featured post

Electronic Payments

When was the last time you paid for a transaction in cash? We all use electronic forms of payment these days, and in some cases people just don't carry cash anymore. So, what are the various forms of electronic payments we use? The following are the usual examples: Credit/Debit Cards (in person or online)Direct Debit... Continue Reading →

Featured post

Securing your Internet of Things

There is a lot of press coverage on what is called 'The Internet of Things', or abbreviated to IoT. What is IoT? This is a collection of devices that are not typically identified as computers. They can be anything from: Light bulbs connected to a home automation systemDomestic appliancesSensors on industrial plantIndustrial RobotsSystems in autonomous... Continue Reading →

Nation State Privacy

The principles I established when I set up this website was to promote Cyber Security and Personal Privacy and how individuals as well as companies (large and small) can ensure their cyber security and privacy. This is an ever changing landscape and I feel I will never be out of a job, especially if what... Continue Reading →

Windows Update Changes

Any regular followers of this site will know that I am a strong advocate of fully licencing software with a valid licence and keeping your licenced software up to date. If you want to read about the consequences of not doing this please see my blog The Dangers to using Unsupported Devices and Software. Microsoft in... Continue Reading →

Encrypted Website Lookup

UPDATED 21 July 2019 - Additional forms of encrypted DNS added, partially rewritten with the title changed to be more generic. This is going to be a technical post, so I need to start this off by explaining a few technical terms, which will also be added to our Glossary of Cyber Security Terms. Some... Continue Reading →

Create a website or blog at WordPress.com

Up ↑