(04/04/23) Blog 94 – SIM swapping – What is it, and should you be concerned?
SIM swapping is a process whereby scammers convince mobile phone operators that they are you…
(03/04/23) Blog 93 – Riding the ransomware wave
Ever keen to earn a quid buck from a situation, cyber criminals are now starting…
(02/04/23) Blog 92 – 3k bot-net rental targets Android devices
A new malware strain is targeting Android devices, and is capable of complete account takeover.…
(01/04/23) Blog 91 – The Vulkan files – Russia’s own Snowden incident
A few days after Russia's invasion of Ukraine (24/02/22), thousands of secret files were leaked…
(31-03-23) Blog 90 – Wi-Fi Vulnerability discovered
Cybersecurity researchers have discovered a vulnerability in the design of the IEEE802.11 standard - This…
(30-03-23) Blog 89 – Protecting your online activity – Pt9
Continuing the mini-series of posts about online security, In this installment, I'll discuss the use…
(29-03-23) Blog 88 – Protecting your online activity – Pt8
In my last post, I talked about the use of cookies by companies when they…
(28-03-23) Blog 87 – Protecting your online activity – Pt7
Reducing the number of tracking technologies employed by websites is one thing I'm quite passionate…
(27-03-23) Blog 86 – Protecting your online activity – Pt6
Staying anonymous online is becoming a difficult thing to achieve, but to be honest, for…