A lot of malware attacks start with a simple Phishing email, or some other social engineering attack. Sometimes they are very believable. All it takes is for you to be distracted, taken in by the plausibility of the message or pushed into clicking a link due to the urgency of the communication to be breached... Continue Reading →
Deep Fakes
Deep fake is a term given to a persuasive-looking but false video and audio files. Made using cutting-edge and relatively accessible AI technology, they purport to show a real person doing or saying something they did not. This can manifest itself in Hollywood films where a greenscreen special effect is used to put the actor... Continue Reading →
Social Media Auditing & Reporting
It's amazing what you find on Twitter. Shortly after posting my blog on how Google indexes all of your public tweets, I came across a tweet where someone had applied for a job and the company performed an audit on his tweets. They delivered a 300+ page PDF of all his tweets including a certain... Continue Reading →
Twitter Posts are Indexed by Google
I was recently looking over the Twitter help pages for something and came across one relating to "Help with Google search visibility". Cutting a long story short, due to the high ranking of Twitter with Google, all public pages on Twitter are indexed on a regular basis by the Google search engine. This includes all... Continue Reading →
Securing your Online Accounts
We all have hundreds of online accounts that we have accumulated over several years on online activity. I know I have as I have just gone through all of them to ensure they are not vulnerable to any form of cyber attack. What kind of Cyber Attacks are we talking about here? There are many,... Continue Reading →
Guidance on Managing and Stopping Spam
We all receive unsolicited messages, be they emails, SMS, IM's as well as by the traditional postal system. By their very nature these messages are largely unwanted and clog up our mailboxes. It should also be noted that unsolicited messages are sometimes malicious, causing you to download malware or disclose private information as part of... Continue Reading →