Purchasing Services Online – A Pocket Guide

How many times have you been browsing a service online that requires a subscription to continue viewing? I can name quite a few: NetflixMicrosoft Office/365SpotifyAmazon PrimeGoogle's YouTube Premium. Online Services Most online services, like the above, will offer a trial period for free and then expect you to sign-up to a subscription service to continue... Continue Reading →

Using Wearable Technology Safely – A Pocket Guide

We all like our gadgets, whether they have some form of smart technology in them or not. Wearable technology is also very popular. What is wearable technology? Wearable technology is simply a technology, or device, that you can attach to your body. This can be: Smart Watches, including the non-smart kindFitness TrackersGPS TrackersEar buds/headphones particularly... Continue Reading →

The TOR Network – A Pocket Guide

HEALTH WARNING … This is not a subject I recommend to novices and the following is provided to explain what the TOR network is and the implications of using it. It is not a recommendation to use this network. What is the TOR Network? TOR stands for 'The Onion Router' and was setup by the... Continue Reading →

Combating Social Engineering 101 – A Pocket Guide

Social Engineering is a form of cyber attack where the physiological manipulation of people to trick them into divulging confidential information that can be used to hack into websites and other computing resources. There are various forms of social engineering: Baiting Impersonating PharmingPhishingSmishingSpear FishingTailgatingVishing Water HolingWebsite CloningWhaling. Lets take a deeper look at these. Baiting... Continue Reading →

Cyber Attacks 101 – A Pocket Guide

A Cyber attack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to, or make unauthorized use of, a computer system. This can be anything from big servers to your smartphone and anything in between. There are various forms of Cyber Attack. The following list are just examples: Brute Force Attack/Dictionary... Continue Reading →

Malware 101 – A Pocket Guide

This post is a general round up of the various types of malware that is in circulation today. Typical types of malware are: BackdoorsFile-less MalwareKey Loggers Ransom Ware Root Kits Trojan HorsesViruses WipersWorms. This can also include social engineering methods, which are often used to get the first foothold in installing some form of malware.... Continue Reading →

Create a website or blog at WordPress.com

Up ↑