Security

  1. Cyber Security Myths

    Image portraying hacking

    In this post we aim to shed some light on some of the most common myths and misunderstandings concerning cyber security, including your passwords. We've seen many different view points and opinions, some often stated as fact, but some of these ideas lead to you being less secure than if you carried on as you were before. Sometimes these comes from your friends and family, other times from "experts" who have been misled by the sheer volume of information available to us in the digital age.
    Some of these myths could be seen as harmless and may even give incidental protection, but others can give you a false sense of security and actively weaken your privacy and security. I have even seen some of these become company policy because they are so widespread.

    I've heard some of these myths so many times, and was even led to believe them until I became more interested in cyber security a few years ago. This post...

  2. Why is my computer fan so loud?

    When your computer is under load – due to, say, playing a game or running video editing software – the components inside have to work harder than usual, which causes them to produce more heat.

  3. What is phishing?

    Phishing

    What is phishing?

    Phishing is the attempt to get sensitive information such as bank details or passwords from someone by masquerading as a legitimate person or company. The word Phishing is a homophone of fishing due to the similarity of using bait to catch a victim.

    How do you know it’s a scam?

    There are different forms of phishing tactics. Most phishing occurs by using a disguised link in an email pretending to be from well-known companies asking to confirm details. Criminals may also try to trick you into giving away your personal information via Social Media messages or text messages. Criminals may try to fool you into installing a malicious software (malware) which can track and record the information you enter into your computer. Below are some of the commonly used tactics and warning signs you should be on the lookout for:

    • Phishers, pretending to be legitimate companies, may use email to request personal information a
    • ...
  4. Apple vs FBI - What have Apple been asked to do?

    iphone padlocked

    As you may be aware, Apple has received a court order to assist in accessing the iPhone of the San Bernadino killer Syed Farook. Apple has agreed to assist but won't back down on one thing. So what exactly has Apple been asked to do?

    FBI Apple Court Order Source: FBI
    1. Prevent the phone from erasing itself
      If certain security settings are enabled, after 10 failed attempts at entering a passcode, an iPhone can erase the personal data on the device. The FBI doesn't want to this to happen.
    2. Automate the process for trying out passcode combinations...
      Farook used a four-digit passcode, f
    3. ...