What’s on your network? Whilst I understand that not everyone is a computer geek, or has the time to manage their home network properly, I firmly believe that everyone should have a good grasp o...
In this post, I’ll take a look at how you can check to see what issues might be present in your IT setup. Nessus Nessus is a professional vulnerability scanner made by a company called Tenable w...
In this installment of my mini-series on protecting your online activity, I’m going to discuss VPNs. What is a VPN? A VPN (Virtual Private Network) is a technology that allows you to create a se...
In this 2nd installment of my mini-series about staying safe in an ever-increasing online world, I’m going to take a look at antivirus & anti-malware solutions. Anti-malware vs Antivirus The...
So far in my 365 days of blogs, the biggest majority of my posts have been about the threats that face us when living in a digital world. So I thought it time to focus a bit more on the defensive side...
Ransomware is big business, but for some threat actors, it’s not big enough. A large number of ransomware attacks tend to use the same encryption algorithms, or ones which have only been slightl...
Federal agents in the US have arrested a man from Peekskill, New York who is suspected of being the administrator of the stolen-data sharing website breachForums. The administrator who uses the online...
If you’ve been following my blogs over the last few months, you’ll have spotted a recurring theme in many of them – ransomware. It’s a scourge of modern Inetrnet life and it ca...
Meta, the parent company behind Facebook, Instagram, and WhatsApp has released what they say is a new, more modern Cyber Kill Chain – A list of the stages and events by which threat actors prepa...
Google have recently announced that their zero-day research team (Project zero) have discovered and reported 18 zero-day vulnerabilities in the Exynos chipsets used in Samsung devices. This chipset is...