Risks Associated with Ghost/Inactive Accounts

Ghost accounts, depending on context, have various definitions. A Ghost Account can be: A social media account made solely to view other people's contentAn inactive account that is still live but has either been forgotten about or is seldom used. Ghost Social Media Accounts People make ghost accounts on social media platforms for a variety... Continue Reading →

A Review of 2020

As we come to the end of 2020, is is customary to review what has happened in the previous 12 months and learn from any events that happened. At the beginning of 2020, no one could have foreseen the chaos that the novel coronavirus COVID-19 would bring. While the start of it was in China... Continue Reading →

Detecting a Phish

A lot of malware attacks start with a simple Phishing email, or some other social engineering attack. Sometimes they are very believable. All it takes is for you to be distracted, taken in by the plausibility of the message or pushed into clicking a link due to the urgency of the communication to be breached... Continue Reading →

New UK Coronavirus Test & Trace App in Trial

On the 13 August 2020 the UK government released a revised Contact Tracing app to be trailed on the Isle of White, the London Borough of Newham and NHS volunteer responders. In addition to the Contact Tracing function it also has other features including: An alert system that informs users of the coronavirus risk level... Continue Reading →

Multi-Phase Cyber Attacks

A lot of people think that a cyber attack is immediately launched when you click on a link, or a hacker exploits a zero day vulnerability. This is not always the case and recent evidence shows that hackers are hiding in plain sight and waiting to launch their ultimate attack. Malware can infiltrate your systems... Continue Reading →

UK Coronavirus Contact Tracing Update

This is an update to my blog Location Tracking, Your Privacy & COVID 19 Contact Tracing to bring this up to date with the recent developments in the UK. The UK were going to develop a COVID 19 Contact Tracing App using a hybdrid technology that was centralised and in which they owned the data... Continue Reading →

Deep Fakes

Deep fake is a term given to a persuasive-looking but false video and audio files. Made using cutting-edge and relatively accessible AI technology, they purport to show a real person doing or saying something they did not. This can manifest itself in Hollywood films where a greenscreen special effect is used to put the actor... Continue Reading →

Anatomy of a Phish

I expect a lot of you have received an email or text that claims you have won a prize and you need to click a link to claim it. This is often unexpected and you don't remember entering a competition to win the said prize. Maybe you have received an email from the Tax Authority... Continue Reading →

The Human Firewall

The first line of defence for any network to repel a cyber attack is often considered the security software on the perimeter of the network - namely the firewalls, and other monitoring software. While a properly configured security framework is essential for any company network, as well as home/small office network, the human element cannot... Continue Reading →

Create a website or blog at WordPress.com

Up ↑