(04/04/23) Blog 94 – SIM swapping – What is it, and should you be concerned?
SIM swapping is a process whereby scammers convince mobile phone operators that they are you…
SIM swapping is a process whereby scammers convince mobile phone operators that they are you…
Ever keen to earn a quid buck from a situation, cyber criminals are now starting…
A new malware strain is targeting Android devices, and is capable of complete account takeover.…
A few days after Russia's invasion of Ukraine (24/02/22), thousands of secret files were leaked…
Cybersecurity researchers have discovered a vulnerability in the design of the IEEE802.11 standard - This…
Continuing the mini-series of posts about online security, In this installment, I'll discuss the use…
In my last post, I talked about the use of cookies by companies when they…
Reducing the number of tracking technologies employed by websites is one thing I'm quite passionate…
Staying anonymous online is becoming a difficult thing to achieve, but to be honest, for…
What's on your network? Whilst I understand that not everyone is a computer geek, or…