Solana – does Proof-of-History improve security?

Layer 1 crypto platform, Solana, offers a faster and cheaper blockchain solution to Ethereum. This is achieved using Proof-of-History combined with Proof-of-Stake consensus. We look at any security implications.Continue readingSolana – does Proof-of-History improve security?

Securing web sites against Hackers

Web sites are frequent targets of Cyber Criminals and Hackers. This is especially the case for financial and online retail sites. So what are the best approaches to securing web sites against these types of attacks?Continue readingSecuring web sites against Hackers

Cyber Security through Deception (part 2)

In this, the second of a 2-part article, we continue to look at Deception Technologies. We examine leading solutions using it to defend against Cyber Attacks.Continue readingCyber Security through Deception (part 2)

Cyber Security through Deception (part 1)

Here we look at what Deception Technology is. We examine the problems faced which may put it to good use. Then the tactics employed and related terminology.Continue readingCyber Security through Deception (part 1)

Living with a Password Manager (part 3)

In the final part of our article we find out how well 1Password stacks up as a Password Manager. We examine how well our password-related objectives are met across a range of scenarios.Continue readingLiving with a Password Manager (part 3)

Living with a Password Manager (part 2)

In this article we examine whether using a Password Manager helps make life easier to remember login credentials when accessing the Internet. We examine the everyday situation of using multiple apps and accessing a multitude of websites across a variety of Internet-enabled devices.Continue readingLiving with a Password Manager (part 2)

Living with a Password Manager (part 1)

Swapping between multiple devices to access the Internet can make remembering login credentials for a variety of apps and websites challenging. Can a Password Manager effectively help with easing this problem?Continue readingLiving with a Password Manager (part 1)

Crypto hacks, heists & scams

As cryptocurrency is becoming more popular for investments and transactions, so too is it becoming a bigger target for crypto hacking. In this article we look at some of the recent events that have taken place.Continue readingCrypto hacks, heists & scams

Trading Safely with Cryptocurrencies

Buying, Selling, Sending & Receiving cryptocurrencies can seem somewhat complex. It is arguably less intuitive than investing in stocks or shopping online. Here we take a look at how to safely shop or trade with crypto.Continue readingTrading Safely with Cryptocurrencies

Keeping your Digital Currency safe using Crypto Wallets

In this article we examine the various types of crypto wallets available for holding cryptocurrencies such as Bitcoin and Altcoins.Continue readingKeeping your Digital Currency safe using Crypto Wallets