Using Wearable Technology Safely – A Pocket Guide

We all like our gadgets, whether they have some form of smart technology in them or not. Wearable technology is also very popular. What is wearable technology? Wearable technology is simply a technology, or device, that you can attach to your body. This can be: Smart Watches, including the non-smart kindFitness TrackersGPS TrackersEar buds/headphones particularly... Continue Reading →

Social Media Auditing & Reporting

It's amazing what you find on Twitter. Shortly after posting my blog on how Google indexes all of your public tweets, I came across a tweet where someone had applied for a job and the company performed an audit on his tweets. They delivered a 300+ page PDF of all his tweets including a certain... Continue Reading →

The TOR Network – A Pocket Guide

HEALTH WARNING … This is not a subject I recommend to novices and the following is provided to explain what the TOR network is and the implications of using it. It is not a recommendation to use this network. What is the TOR Network? TOR stands for 'The Onion Router' and was setup by the... Continue Reading →

Twitter Posts are Indexed by Google

I was recently looking over the Twitter help pages for something and came across one relating to "Help with Google search visibility". Cutting a long story short, due to the high ranking of Twitter with Google, all public pages on Twitter are indexed on a regular basis by the Google search engine. This includes all... Continue Reading →

A Review of 2019

What a difference 365 days makes. 2019 has been an eventful year for cyber security professionals with a number of new threats emerging as well as an escalation in ransomware and level of data breaches as well as all the normal threat vectors. IoT has also featured heavily in the cyber security landscape. But first... Continue Reading →

Industrial Hacking

I don't normally comment on specific news stories on here (that is what our Twitter account is for), but this one was of particular interest. Earlier this year an Israeli intelligence expert named Tal Dilian (co-founder of Circles Technologies – a surveillance firm) showed off his van with surveillance equipment worth $9 million in Cyprus.... Continue Reading →

Virtual Private Networks

We have all seen the adverts on TV, and in the media in general, around how a Virtual Private Network (VPN) will secure your web browsing, and make your connection totally private. Well, I hate to say this, but this is not totally true. So, what is a VPN? We need to first of all... Continue Reading →

Using Cloud Services Safely

Whether or not you realise it, we all use the cloud for something in our daily lives. In this blog I want to explain in simple terms what 'The Cloud' is and how you can apply some simple safeguards to secure your use of it. What is the Cloud - a History Lesson? Lets go... Continue Reading →

Nation State Privacy

The principles I established when I set up this website was to promote Cyber Security and Personal Privacy and how individuals as well as companies (large and small) can ensure their cyber security and privacy. This is an ever changing landscape and I feel I will never be out of a job, especially if what... Continue Reading →

Encrypted Website Lookup

UPDATED 21 July 2019 - Additional forms of encrypted DNS added, partially rewritten with the title changed to be more generic. This is going to be a technical post, so I need to start this off by explaining a few technical terms, which will also be added to our Glossary of Cyber Security Terms. Some... Continue Reading →

Create a website or blog at WordPress.com

Up ↑