Cyber Security through Deception (part 1)

Here we look at what Deception Technology is. We examine the problems faced which may put it to good use. Then the tactics employed and related terminology.Continue readingCyber Security through Deception (part 1)

Privacy & Security via Tails & Qubes OS

Staying safe whilst using a computer is becoming more important by the day. Whether at home, work, or traveling your computer is vulnerable to being compromised. This article looks at 2 operating systems with a primary focus on privacy & security.Continue readingPrivacy & Security via Tails & Qubes OS

Living with a Password Manager (part 3)

In the final part of our article we find out how well 1Password stacks up as a Password Manager. We examine how well our password-related objectives are met across a range of scenarios.Continue readingLiving with a Password Manager (part 3)

Living with a Password Manager (part 2)

In this article we examine whether using a Password Manager helps make life easier to remember login credentials when accessing the Internet. We examine the everyday situation of using multiple apps and accessing a multitude of websites across a variety of Internet-enabled devices.Continue readingLiving with a Password Manager (part 2)

Living with a Password Manager (part 1)

Swapping between multiple devices to access the Internet can make remembering login credentials for a variety of apps and websites challenging. Can a Password Manager effectively help with easing this problem?Continue readingLiving with a Password Manager (part 1)

Does a VPN keep you Safe & Secure?

Identity theft, online scams, viruses, and the risk of being hacked are all very real threats whilst accessing the Internet. Can using a VPN protect you from these hostilities?Continue readingDoes a VPN keep you Safe & Secure?

Top 10 Cyber Security magazines

How do IT Professionals find out about the latest Cyber Security threats & vulnerabilities, strategies to employ to keep systems & data both safe & secure, and software & hardware to deploy in the on-going war with Cyber Criminals & malicious Hackers?Continue readingTop 10 Cyber Security magazines

How To build ‘A Little Offensive Appliance’

In this article we examine how to turn a Raspberry Pi Zero W into a flexible low-cost USB Pentesting device for physical engagements using Kali Linux & P4wnP1 A.L.O.A.Continue readingHow To build ‘A Little Offensive Appliance’

Cyber Security events 2021

2020 was an almost complete wash-out for Cyber Security events. So how are things looking for 2021 or is it still to early to say?Continue readingCyber Security events 2021

Avoid becoming a Victim of Cyber Crime

Cyber Crime takes on many forms so what are the different types and how best can you avoid becoming a victim of scams, identity theft or being hacked?Continue readingAvoid becoming a Victim of Cyber Crime