Security

  1. Cyber Security Myths

    Image portraying hacking

    In this post we aim to shed some light on some of the most common myths and misunderstandings concerning cyber security, including your passwords. We've seen many different view points and opinions, some often stated as fact, but some of these ideas lead to you being less secure than if you carried on as you were before. Sometimes these comes from your friends and family, other times from "experts" who have been misled by the sheer volume of information available to us in the digital age.

  2. Why is my computer fan so loud?

    When your computer is under load – due to, say, playing a game or running video editing software – the components inside have to work harder than usual, which causes them to produce more heat.

  3. What is phishing?

    Phishing

    What is phishing?

    Phishing is the attempt to get sensitive information such as bank details or passwords from someone by masquerading as a legitimate person or company. The word Phishing is a homophone of fishing due to the similarity of using bait to catch a victim.

    How do you know it’s a scam?

    There are different forms of phishing tactics. Most phishing occurs by using a disguised link in an email pretending to be from well-known companies asking to confirm details. Criminals may also try to trick you into giving away your personal information via Social Media messages or text messages. Criminals may try to fool you into installing a malicious software (malware) which can track and record the information you enter into your computer. Below are some of the commonly used tactics and warning signs you should be on the lookout for:

    • Phishers, pretending to be legitimate companies, may use email to request personal information and direct recipients to respond through malicious websites. Phishers have been known to use real company logos, and will also use a spoofed email address, which is an email address that is similar to the actual company’s address. However, the address may be misspelled slightly or come from a spoofed domain. Always look for this tell-tale sign.
    • Emails may come in the form of a help desk support ticket, a message from your bank, or from someone soliciting money via an advanced fee (419) scam. I’m sure many of you have received an email from a Nigerian Prince offering a share of $50m?!
    • Phishers tend to use a call to action. You may get a notice that an account is being shut down and you need to log into it to avoid that from happening. They may also request personal information in order to verify your identity.
    • Phishing websites can look much like legitimate sites because they tend to use the same images and layouts as the original sites.
    • Fraudulent messa
  4. Apple vs FBI - What have Apple been asked to do?

    iphone padlocked

    As you may be aware, Apple has received a court order to assist in accessing the iPhone of the San Bernadino killer Syed Farook. Apple has agreed to assist but won't back down on one thing. So what exactly has Apple been asked to do?

    FBI Apple Court Order Source: FBI
    1. Prevent the phone from erasing itself
      If certain security settings are enabled, after 10 failed attempts at entering a passcode, an iPhone can erase the personal data on the device. The FBI doesn't want to this to happen.
    2. Automate the process for trying out passcode combinations...
      Farook used a four-digit passcode, for which there are 10,000 possible combinations. The FBI doesn't want to have to guess them all manually and so it wants Apple to allow the passcode to be tried electronically. This means the FBI could simply instruct a computer to try every passcode, something that would take just minutes or even seconds.
    3. …and without unnecessary delay.
      Currently the iPhone prevents you from entering a passcode for longer and longer periods of time each time you get it wrong. The FBI wants this barrier removed.
    4. Control the process, but not know how it's done.
      This is an interesting line, as it is suggests the FBI is willing to allow Apple to work on the phone at its own HQ, and in a way that doesn't risk the encryption software being released into the world.

    In short, the FBI want Apple to create and install a "back door" in the operating system which would all