Social Media Auditing & Reporting

It's amazing what you find on Twitter. Shortly after posting my blog on how Google indexes all of your public tweets, I came across a tweet where someone had applied for a job and the company performed an audit on his tweets. They delivered a 300+ page PDF of all his tweets including a certain... Continue Reading →

The TOR Network – A Pocket Guide

HEALTH WARNING … This is not a subject I recommend to novices and the following is provided to explain what the TOR network is and the implications of using it. It is not a recommendation to use this network. What is the TOR Network? TOR stands for 'The Onion Router' and was setup by the... Continue Reading →

Twitter Posts are Indexed by Google

I was recently looking over the Twitter help pages for something and came across one relating to "Help with Google search visibility". Cutting a long story short, due to the high ranking of Twitter with Google, all public pages on Twitter are indexed on a regular basis by the Google search engine. This includes all... Continue Reading →

What is Cyber Warfare?

What with the current news around the events in Iran, the security level has been raised across most of the western world. With the heightened security levels, we can also expect cyber attacks from nation state actors based in Iran and the middle east on western infrastructure. This blog has been in my backlog for... Continue Reading →

A Review of 2019

What a difference 365 days makes. 2019 has been an eventful year for cyber security professionals with a number of new threats emerging as well as an escalation in ransomware and level of data breaches as well as all the normal threat vectors. IoT has also featured heavily in the cyber security landscape. But first... Continue Reading →

Windows 7 Support ends 14th January 2020

As I have blogged on two previous occasions, support for Windows 7 ends on 14th January 2020. This means: All patching of security flaws ends and you will not receive any further patches from 14th January 2020 being the last patch Tuesday that will include widely available Windows 7 patchesMicrosoft Security Essentials also retires on... Continue Reading →

Industrial Hacking

I don't normally comment on specific news stories on here (that is what our Twitter account is for), but this one was of particular interest. Earlier this year an Israeli intelligence expert named Tal Dilian (co-founder of Circles Technologies – a surveillance firm) showed off his van with surveillance equipment worth $9 million in Cyprus.... Continue Reading →

Open Redirects & Malware Installers

This week I noticed a report on how malware could be downloaded and installed using an Open Redirect from Cisco. Lets first define what an Open Redirect is. An open redirect is when a legitimate site allows unauthorized users to create URLs on that site to redirect visitors to other sites. For example, Google has... Continue Reading →

Myths of Cyber Security

I have found there is a general perception among people that they won't be hit by a cyber attack of some form and that cyber security is not something they need to worry about too much, after all you have installed an Internet Security product on your PC and you download apps from the official... Continue Reading →

Create a website or blog at WordPress.com

Up ↑