Multi-Phase Cyber Attacks

A lot of people think that a cyber attack is immediately launched when you click on a link, or a hacker exploits a zero day vulnerability. This is not always the case and recent evidence shows that hackers are hiding in plain sight and waiting to launch their ultimate attack. Malware can infiltrate your systems... Continue Reading →

Deep Fakes

Deep fake is a term given to a persuasive-looking but false video and audio files. Made using cutting-edge and relatively accessible AI technology, they purport to show a real person doing or saying something they did not. This can manifest itself in Hollywood films where a greenscreen special effect is used to put the actor... Continue Reading →

Anatomy of a Phish

I expect a lot of you have received an email or text that claims you have won a prize and you need to click a link to claim it. This is often unexpected and you don't remember entering a competition to win the said prize. Maybe you have received an email from the Tax Authority... Continue Reading →

The Human Firewall

The first line of defence for any network to repel a cyber attack is often considered the security software on the perimeter of the network - namely the firewalls, and other monitoring software. While a properly configured security framework is essential for any company network, as well as home/small office network, the human element cannot... Continue Reading →

What your Travel Documents Know About You

Anyone who has traveled by aircraft will have had to go through the whole boarding pass process. However, what information does a boarding pass have on it about you and how accessible is it? A typical boarding pass has the following information printed on it: Your NameFlight Number and Airline NameDate of DepartureDeparture and Destination... Continue Reading →

Social Media Auditing & Reporting

It's amazing what you find on Twitter. Shortly after posting my blog on how Google indexes all of your public tweets, I came across a tweet where someone had applied for a job and the company performed an audit on his tweets. They delivered a 300+ page PDF of all his tweets including a certain... Continue Reading →

Create a website or blog at WordPress.com

Up ↑