This is a general category where we will post articles that apply to Cyber Security in general and also articles that do not fit neatly into other categories.
It doesn’t matter whether you are a consumer or a large corporation, you can’t hope to produce everything you need on a daily basis. You can’t produce enough food to feed yourself, and a company can’t build all the operating systems and applications to run its business. We all depend on suppliers of some form,… Continue Reading →
We have blogged extensively on how and why you should backup your data. However, as we have all gone to a more remote working scenario due to current events, it is even more important to ensure your valuable data is backed up. During the pandemic we have seen an increase in cyber attacks, and in… Continue Reading →
In our recent blog post “Multi-Phase Cyber Attacks” we described how cyber attacks are often not a single instance but part of a planned attack that can be sustained over several months, even years. An attack may only become apparent when the cyber attacker makes themselves known through some form of visible attack, a security… Continue Reading →
Steve Wozniak was the co-founder of Apple, but arguably one of the most notable engineers responsible for kickstarting the modern PC era. Steve Wozniac grew up in Silicon Valley (before it was called that). From an early age was interested in electronics and with the help of his father (an electronics engineer himself) built a… Continue Reading →
Paul Allen was the co-founder of Microsoft with Bill Gates. This book is an autobiography of his life both before meeting Bill Gates, during the Microsoft days and after he left to follow other pursuits. He was born in 1953 and was two years older than Bill Gates. As this is written by Paul Allen… Continue Reading →
Ghost accounts, depending on context, have various definitions. A Ghost Account can be: A social media account made solely to view other people’s content An inactive account that is still live but has either been forgotten about or is seldom used. Ghost Social Media Accounts People make ghost accounts on social media platforms for a… Continue Reading →
How often have you received an email (or for that matter an instant message) with marketing graphics embedded into it? I am guessing all the time? These marketing graphics are image files (GIF, JPG, PNG) that are added to the message. Remote Images Cyber criminals often include images in their phishing messages to represent the… Continue Reading →
Starting 16 January 2021, Flash Player is officially dead and any current installations will block the playing of any Flash content. Adobe ceased to support Adobe Flash Player as of 31 December 2020 and all download pages from their website have been taken down. Why is this happening? Adobe Flash Player is a legacy multi-media… Continue Reading →
As we come to the end of 2020, is is customary to review what has happened in the previous 12 months and learn from any events that happened. At the beginning of 2020, no one could have foreseen the chaos that the novel coronavirus COVID-19 would bring. While the start of it was in China… Continue Reading →
Updated 16 January 2021 Never let a good crisis go to waste – at least this is what Cyber criminals and Scammers have been doing all this year in relation to the COVID-19 pandemic. There have been multiple scams and cyber attacks relating to the pandemic (we will review some of them in our 2020… Continue Reading →
We would like to wish all our followers, both here and on our Twitter Account, a Happy Christmas (whatever that means for this year) and hopefully a prosperous New Year. Back in January, no-one could have foreseen the disruption the Novel Coronavirus would have caused, and in particular with the move to work from home… Continue Reading →
Something went wrong. Please refresh the page and/or try again.
Headline image provided by ShutterStock.