Android 11 Preview Released

This week (WC 7 June 2020) the first preview of Android 11 (the latest iteration in the Android smartphone operating system) was released for specific test handsets. This brings a number of security and privacy updates as well as some functional updates that you may either love or hate. Privacy Updates A number of privacy... Continue Reading →

What your Travel Documents Know About You

Anyone who has traveled by aircraft will have had to go through the whole boarding pass process. However, what information does a boarding pass have on it about you and how accessible is it? A typical boarding pass has the following information printed on it: Your NameFlight Number and Airline NameDate of DepartureDeparture and Destination... Continue Reading →

Social Media Auditing & Reporting

It's amazing what you find on Twitter. Shortly after posting my blog on how Google indexes all of your public tweets, I came across a tweet where someone had applied for a job and the company performed an audit on his tweets. They delivered a 300+ page PDF of all his tweets including a certain... Continue Reading →

The TOR Network – A Pocket Guide

HEALTH WARNING … This is not a subject I recommend to novices and the following is provided to explain what the TOR network is and the implications of using it. It is not a recommendation to use this network. What is the TOR Network? TOR stands for 'The Onion Router' and was setup by the... Continue Reading →

Twitter Posts are Indexed by Google

I was recently looking over the Twitter help pages for something and came across one relating to "Help with Google search visibility". Cutting a long story short, due to the high ranking of Twitter with Google, all public pages on Twitter are indexed on a regular basis by the Google search engine. This includes all... Continue Reading →

A Review of 2019

What a difference 365 days makes. 2019 has been an eventful year for cyber security professionals with a number of new threats emerging as well as an escalation in ransomware and level of data breaches as well as all the normal threat vectors. IoT has also featured heavily in the cyber security landscape. But first... Continue Reading →

Create a website or blog at WordPress.com

Up ↑