Detecting a Phish

A lot of malware attacks start with a simple Phishing email, or some other social engineering attack. Sometimes they are very believable. All it takes is for you to be distracted, taken in by the plausibility of the message or pushed into clicking a link due to the urgency of the communication to be breached... Continue Reading →

Deep Fakes

Deep fake is a term given to a persuasive-looking but false video and audio files. Made using cutting-edge and relatively accessible AI technology, they purport to show a real person doing or saying something they did not. This can manifest itself in Hollywood films where a greenscreen special effect is used to put the actor... Continue Reading →

Social Media Auditing & Reporting

It's amazing what you find on Twitter. Shortly after posting my blog on how Google indexes all of your public tweets, I came across a tweet where someone had applied for a job and the company performed an audit on his tweets. They delivered a 300+ page PDF of all his tweets including a certain... Continue Reading →

Twitter Posts are Indexed by Google

I was recently looking over the Twitter help pages for something and came across one relating to "Help with Google search visibility". Cutting a long story short, due to the high ranking of Twitter with Google, all public pages on Twitter are indexed on a regular basis by the Google search engine. This includes all... Continue Reading →

Guidance on Managing and Stopping Spam

We all receive unsolicited messages, be they emails, SMS, IM's as well as by the traditional postal system. By their very nature these messages are largely unwanted and clog up our mailboxes. It should also be noted that unsolicited messages are sometimes malicious, causing you to download malware or disclose private information as part of... Continue Reading →

Create a website or blog at WordPress.com

Up ↑