Cyber Attacks 101 – A Pocket Guide

A Cyber attack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to, or make unauthorized use of, a computer system. This can be anything from big servers to your smartphone and anything in between. There are various forms of Cyber Attack. The following list are just examples: Brute Force Attack/Dictionary... Continue Reading →

Malware 101 – A Pocket Guide

This post is a general round up of the various types of malware that is in circulation today. Typical types of malware are: BackdoorsFile-less MalwareKey Loggers Ransom Ware Root Kits Trojan HorsesViruses WipersWorms. This can also include social engineering methods, which are often used to get the first foothold in installing some form of malware.... Continue Reading →

Securing your Internet of Things

There is a lot of press coverage on what is called 'The Internet of Things', or abbreviated to IoT. What is IoT? This is a collection of devices that are not typically identified as computers. They can be anything from: Light bulbs connected to a home automation systemDomestic appliancesSensors on industrial plantIndustrial RobotsSystems in autonomous... Continue Reading →

Nation State Privacy

The principles I established when I set up this website was to promote Cyber Security and Personal Privacy and how individuals as well as companies (large and small) can ensure their cyber security and privacy. This is an ever changing landscape and I feel I will never be out of a job, especially if what... Continue Reading →

Email Tracking

For the most part email has given way to a number of instant messengers (e.g. Facebook Messenger, WhatsApp, Telegram) as well as messaging through social media for most consumers. However email continues to be significant means of communication in the business setting. What may not be well known is that email can be tracked very... Continue Reading →

Create a website or blog at WordPress.com

Up ↑