Articles

DNS is the backbone of the internet, get it wrong and it can cause serious problems - just look at the Daily Express website
If only there was a certifiable technical security standard like there is for home door locks and handles
NHS ransomware: If 60+ hospital trusts can be taken down by mass market untargeted malware then what else has and can get through?
Pulling apart a Trickbot banking trojan email
Not all forms of multi or two factor authentication are “bulletproof”
WhatsApp privacy & security and the terrorist attack on Westminster
Email borne malware: if the majority of burglars came through your front door, wouldn’t you focus protection on that entry method?
Whitelisting: there is more to it than just blocking or allowing applications
The security triangle: simplicity and user intuitiveness can equal reduced security
Cloud security: large scale public/private cloud is generally more secure but you can be the weakest link just like with on premise
The Tesco Bank hack: my own theories on how it may have happened
Mrs. Clinton’s private mail server scenario is not actually as rare as you may think
TalkTalk hack: The ICO’s biggest fine so far - TalkTalk must be trembling in their shoes, erh, no
IoT security is like running before you can walk
First time home buyers: what a helpful government we have!
Brexit and recession: if you think negatively that is how the economy will go
Backup! Data loss can happen to anyone including me who is paranoid on security and privacy
Help we are under attack! Let’s create a hundred-page defence plan not actually roll out the big guns
Can encryption protect your secrets against “APTs” and web exfiltration? Well, it depends...
We have found a possible IED (bomb) left suitcase, let’s move it around and open it!
Pulling apart a mass market personalised malware debt invoice email
If you cannot stop mass market ransomware, how will you withstand targeted malware attacks?
Your name might be (Commander) Bond, James Bond, but don’t shout it out on the Tube
Personal view and observations around commercial (corporate) Wi-Fi data collection in the United Kingdom and Europe
Free photocopier or confidential archived documents anyone?
Supply chain security: this will make you think twice about shopping online, especially at adult stores
Surface 3’s forced cloud encryption key upload
Dissection of a Microsoft Word .doc attachment with embedded .vbs downloader (Dridex banking trojan)
Personal thoughts on: Chappie (film) plus SCADA and robot security!
Evolving malware entry methods – the Jscript (.js) “virus”
What would you leave unattended in Starbucks?
Password security - it is not all about length and strength
Computer Scam Exposed By EncSec Security Director – Beware Identity Theft and Ransom from Scam Callers
Security for the super-rich is not just about bullet proof cars and entourages, what about cyber bodyguards?
Indian public organisations from local to central government are wide open to email hacking, hacktivism and espionage, says UK email security firm
NatWest Fail To Adequately Protect Customers Online From Increasingly Sophisticated Cyber Crime Threats
What actually happens when you click on a link within a “PayPal” email? Here is one example.
Anatomy of a DOCM (Microsoft Word macro document) email based virus
OpenSSL Heartbleed: Expert On Criminal and Government Theories
Companies Exposed As 5 in 6 AntiVirus Solutions Fail To Identify Threats
Standard antivirus is so from the noughties – only 1/6 antivirus vendors detected a virus
Anatomy of an email based virus #1
Appalling IT security failings revealed at Transport for London
Tips to help you avoid government surveillance schemes like PRISM
Cyber security: A real Skyfall is just waiting to happen
News of the World phone hacking is the just the tip of the iceberg, according to security expert
HNWI security expert: there is more to worry about than evil viruses and basement hackers
IT security professional’s ten tips to keep your smartphone secure
Concerned about data security? Why the ICO and FSA do not do businesses any favours.
Website security speak is often marketing baloney speak
Traditional approaches to antivirus will fail for home and small-business users
IT Security: companies do not do themselves any favours
SME IT security: creating a simple and affordable bullet-proof closed network
Cloud computing: don't put all your eggs in one basket
Is technology moving too quickly to be secure?
Why not controlling your business data is a bad idea
Cyber attacks, social media and internet information
Cyber warfare: truth is stranger than fiction
Web monitoring and blocking will only infuriate LulzSec and similar groups
Will they ever learn on USB flash drives?
Certified Ethical Hacker's analysis of FBI-UK police call hack
The bring your own device nightmare
Protect those who protect others
The drastic increase of faux internet security suites
Drive by downloads is the latest fashion in malware infections
Landline hacking the next thing or a forgotten subject?
Certified Ethical Hacker's analysis of “Anonymous” breach of Strategic Forecasting Inc
Professional hacker three-top-tips to make your network hack proof
Password encryption versus key file encryption
Thinking outside the firewall (short)
Thinking outside the firewall (full)
Choosing a strong password
World renowned IT security expert sets up non-profit advice website
Social engineering true life story – “The IT support company”
Could cyber espionage using social media be China's new frontline?
Your social media usage could easily be the terrorist's strongest link
NOTW phone-hackling scandal is kid's stuff
Social engineering true life story – “The runners”
A third of all SME closures are down to human error, warns IT specialist
Data protection and IT security: Are your employees the weak link?
NOTW phone hacking explained
The Windows password prompt myth
Rules are meant to be broken
The USB vulnerability present in most companies and three scenarios compared
The firewall and antivirus myth ... is it enough?
It will never happen to me. Well it nearly happened to us and we're a data security company
ICO Data Protection Act and encryption of data
Digital signatures explained
The underrated physical threat to data security is a clear and present danger
The importance of backing up your data
The ever-increasing USB data-loss problem
Cyber warfare, an increasing threat
Encryption software - Free And Open Source Vs. Proprietary
First data protection act fines issued by commissioner
Vulnerabilities of wireless networking