For a small business or home office, it seems very easy today to set up your own “view from anywhere” CCTV system, but we often find the security is not correctly configured. Add to that that the manufacturer’s security can be faulty… Over 80,000 exploitable Hikvision cameras exposed online – …
Credential thefts and Amazon’s AWS cloud
Threat actors have to host their malicious login stealing pages somewhere – why not in Amazon’s cloud: Hiding a phishing attack behind the AWS cloud
I do not use the Apple iOS VPN and here’s why… Written whilst on holiday using a VPN.
When I use a VPN, I do it because I want my communications across the internet to be private. Apple iOS VPN is not private enough: Two years on, Apple iOS VPNs still leak IP addresses • The Register I always use a VPN when I suspect the internet connection …
Smartphone security
I think if you read this blog, you have a smartphone and that the security of that smartphone is important to you. By now you should also understand that the functionality of that smartphone is a trade off between your privacy with the various suppliers. I do not use some …
WordPress hack
Many of us use WordPress for our web sites – if you do not know what your web designer is using for you website, then you have a cyber security issue, and you or your cyber security consultant should get in contact with your web designer ASAP. Here is one …
