Electronic Payments

When was the last time you paid for a transaction in cash? We all use electronic forms of payment these days, and in some cases people just don't carry cash anymore. So, what are the various forms of electronic payments we use? The following are the usual examples: Credit/Debit Cards (in person or online)Direct Debit... Continue Reading →

Securing your Internet of Things

There is a lot of press coverage on what is called 'The Internet of Things', or abbreviated to IoT. What is IoT? This is a collection of devices that are not typically identified as computers. They can be anything from: Light bulbs connected to a home automation systemDomestic appliancesSensors on industrial plantIndustrial RobotsSystems in autonomous... Continue Reading →

Nation State Privacy

The principles I established when I set up this website was to promote Cyber Security and Personal Privacy and how individuals as well as companies (large and small) can ensure their cyber security and privacy. This is an ever changing landscape and I feel I will never be out of a job, especially if what... Continue Reading →

Windows Update Changes

Any regular followers of this site will know that I am a strong advocate of fully licencing software with a valid licence and keeping your licenced software up to date. If you want to read about the consequences of not doing this please see my blog The Dangers to using Unsupported Devices and Software. Microsoft in... Continue Reading →

Encrypted Website Lookup

UPDATED 21 July 2019 - Additional forms of encrypted DNS added, partially rewritten with the title changed to be more generic. This is going to be a technical post, so I need to start this off by explaining a few technical terms, which will also be added to our Glossary of Cyber Security Terms. Some... Continue Reading →

Encrypted Messaging and the “Ghost Protocol”

This is sort of an extension to my blog from last week on 'Going Dark – The Problem with Full Encryption" in that it explores a proposal from the UK's GCHC (General Communications Head Quarters) for exceptional access to encrypted messaging platforms (e.g. iMessage, WhatsApp, Signal, Skype). Firstly I need to emphasis at the outset that... Continue Reading →

Create a website or blog at WordPress.com

Up ↑