Cyber Security during a Pandemic

Just about everyone on the planet knows now that we have a COVID19 (Coronavirus) pandemic on our hands. However, cyber criminals are taking advantage of this current crisis, and people's fears, to spread malware. I will post a list of validated and legitimate news sources at the end of this blog. What are Cyber Criminals... Continue Reading →

Social Media Auditing & Reporting

It's amazing what you find on Twitter. Shortly after posting my blog on how Google indexes all of your public tweets, I came across a tweet where someone had applied for a job and the company performed an audit on his tweets. They delivered a 300+ page PDF of all his tweets including a certain... Continue Reading →

What is Cyber Warfare?

What with the current news around the events in Iran, the security level has been raised across most of the western world. With the heightened security levels, we can also expect cyber attacks from nation state actors based in Iran and the middle east on western infrastructure. This blog has been in my backlog for... Continue Reading →

Myths of Cyber Security

I have found there is a general perception among people that they won't be hit by a cyber attack of some form and that cyber security is not something they need to worry about too much, after all you have installed an Internet Security product on your PC and you download apps from the official... Continue Reading →

Cyber Attacks 101 – A Pocket Guide

A Cyber attack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to, or make unauthorized use of, a computer system. This can be anything from big servers to your smartphone and anything in between. There are various forms of Cyber Attack. The following list are just examples: Brute Force Attack/Dictionary... Continue Reading →

Malware 101 – A Pocket Guide

This post is a general round up of the various types of malware that is in circulation today. Typical types of malware are: BackdoorsFile-less MalwareKey Loggers Ransom Ware Root Kits Trojan HorsesViruses WipersWorms. This can also include social engineering methods, which are often used to get the first foothold in installing some form of malware.... Continue Reading →

Securing your Internet of Things

There is a lot of press coverage on what is called 'The Internet of Things', or abbreviated to IoT. What is IoT? This is a collection of devices that are not typically identified as computers. They can be anything from: Light bulbs connected to a home automation systemDomestic appliancesSensors on industrial plantIndustrial RobotsSystems in autonomous... Continue Reading →

RDP Bug on Windows – Patch Now

In the past few weeks a highly dangerous vulnerability has been made public in older (and largely unsupported or near end of support) versions of Windows, namely: Windows Server 2008Windows 7 ProWindows 2003Windows XP Pro. This is being named 'BlueKeep' and has been proven to be remotely exploitable without any authentication. There are currently estimated... Continue Reading →

Create a website or blog at WordPress.com

Up ↑