UPDATED 31 May 2019 If you are still on Windows 7, and a corporate without an exit strategy, you need to take note of two things: Window's 7 ceases extended support in January 2020, after which you won't get any security patchesUpdates happening in the next few months, if not applied, will stop your security... Continue Reading →
I apologise for the rather technical nature of this post, but it is necessary to get across the point I am trying to make. Same-Site Cookies The HTTP protocol that our web browsers uses is stateless, which means that the browser and the resulting webpage don't natively know where you have come from, or what... Continue Reading →
Normally in May Microsoft hold their annual developers conference called Microsoft Build (and for this year and last year (2018) it clashed with the Google IO developer conference - not sure if that is by design or just bad planning) . You need to understand where Microsoft is right now in relation to what services... Continue Reading →
If the answer is anything other than Yes, you probably need help. Would you like us to write up and post suggestions on how to secure your Android Phone and Google Services? Please let us know using our contact page. Headline image provided by Gerd Altmann on Pixabay.
Every year around May Google host their global developer conference. This is the venue where developers, and consumers alike, hear about new features provided by Google services and OS's. In the Keynote they normally make most of the main announcements for new features and products, and in this blog I want to focus in on... Continue Reading →
Why not test your knowledge and take part in our latest Poll ... If you don't know the answer, why not take a look at our blog posts? Headline image provided by Gerd Altmann on Pixabay.
We have written about Credential Stuffing Attacks previously, so this is largely an update for that blog post with some additional information and research that has just come to our attention. Firstly, lets define what this means. A Credential Stuffing Attack is where a cyber attacker will attempt to gain access to a computer system... Continue Reading →