Using Wearable Technology Safely – A Pocket Guide

We all like our gadgets, whether they have some form of smart technology in them or not. Wearable technology is also very popular. What is wearable technology? Wearable technology is simply a technology, or device, that you can attach to your body. This can be: Smart Watches, including the non-smart kindFitness TrackersGPS TrackersEar buds/headphones particularly... Continue Reading →

Social Media Auditing & Reporting

It's amazing what you find on Twitter. Shortly after posting my blog on how Google indexes all of your public tweets, I came across a tweet where someone had applied for a job and the company performed an audit on his tweets. They delivered a 300+ page PDF of all his tweets including a certain... Continue Reading →

The TOR Network – A Pocket Guide

HEALTH WARNING … This is not a subject I recommend to novices and the following is provided to explain what the TOR network is and the implications of using it. It is not a recommendation to use this network. What is the TOR Network? TOR stands for 'The Onion Router' and was setup by the... Continue Reading →

Twitter Posts are Indexed by Google

I was recently looking over the Twitter help pages for something and came across one relating to "Help with Google search visibility". Cutting a long story short, due to the high ranking of Twitter with Google, all public pages on Twitter are indexed on a regular basis by the Google search engine. This includes all... Continue Reading →

What is Cyber Warfare?

What with the current news around the events in Iran, the security level has been raised across most of the western world. With the heightened security levels, we can also expect cyber attacks from nation state actors based in Iran and the middle east on western infrastructure. This blog has been in my backlog for... Continue Reading →

A Review of 2019

What a difference 365 days makes. 2019 has been an eventful year for cyber security professionals with a number of new threats emerging as well as an escalation in ransomware and level of data breaches as well as all the normal threat vectors. IoT has also featured heavily in the cyber security landscape. But first... Continue Reading →

Windows 7 Support ends 14th January 2020

As I have blogged on two previous occasions, support for Windows 7 ends on 14th January 2020. This means: All patching of security flaws ends and you will not receive any further patches from 14th January 2020 being the last patch Tuesday that will include widely available Windows 7 patchesMicrosoft Security Essentials also retires on... Continue Reading →

Industrial Hacking

I don't normally comment on specific news stories on here (that is what our Twitter account is for), but this one was of particular interest. Earlier this year an Israeli intelligence expert named Tal Dilian (co-founder of Circles Technologies – a surveillance firm) showed off his van with surveillance equipment worth $9 million in Cyprus.... Continue Reading →

Create a website or blog at WordPress.com

Up ↑