Understanding Location Information And Digital Photos

Those of you who have read my previous 3 blogs will have gained an understanding on the basics of location security, as shown in the first blog. The second showed how some apps will automatically opt you into location services and the third explains how applications can “scrape” your social media posts into other applications.
-> Continue reading Understanding Location Information And Digital Photos

Which Apps Use My Location?

My previous two blogs talked about the location settings on a phone and how your location is transmitted by opting in to different features within some social media apps. This blog will explore how other apps can “scrape” your location information. Let’s start at the technical level. Any developer can use a published API to
-> Continue reading Which Apps Use My Location?

location security

Location Security

Cards and contactless payments leave an extremely detailed digital footprint that can be used to track individuals while travelling. However, do we think about the implications of our social media use during our trips from a safety perspective (location security)? The woes of various celebrities have been well publicized in the past. Sporting stars whose
-> Continue reading Location Security

Wipe After You Swipe: Your mobile passcodes exposed!

You may have already heard of the security concerns regarding passwords and how easily attackers can take advantage of poor password security. However, the physical security of mobile devices stands to be deceptively inconspicuous among the latest security concerns. Character-based passwords are commonly broken due to poor complexity or discovering re-used passwords from services such
-> Continue reading Wipe After You Swipe: Your mobile passcodes exposed!

3 Cyber Security Threats You Could Face

In recent years there’s been increase in the frequency and severity of individual people and groups attempting to expose flaws in security systems. There are a number of reasons why people attempt do this such as: access to private information, stealing accounts, or even to demand money from the victim of the breach. Below are
-> Continue reading 3 Cyber Security Threats You Could Face

What Technology Does 2018 Have In Store?

There have been some fantastic developments in the corporate delivery of technology and communications in 2017, with so many businesses of all sizes utilising emerging technologies. 4G networks and VoIP telephone services have all been used in a bid to increase customer service. As we head into 2018, we look forward as to what could
-> Continue reading What Technology Does 2018 Have In Store?

The Risk of Sharing Passwords

In our modern day digital lives, one of the most challenging aspects is managing all of our online account passwords. In a recent study done by Experian, a credit monitoring firm, they found that people between the ages of 25-34 register for an average of 40 accounts per email address. However, across those 40 accounts,
-> Continue reading The Risk of Sharing Passwords

Facebook App for Kids

Social media giant, Facebook is currently trialling a Facebook Messaging App for Kids in the U.S. Launched last week, Facebook has announced its first app tailored for young users, it incorporates a ring-fenced network that will need parental approval on both sides before use. Messenger Kids is a simpler version of the messaging app Facebook
-> Continue reading Facebook App for Kids

The Internet of Things Tops Lists This Christmas

One of the biggest trends in 2017 in terms of technology, has been the Internet of Things (IoT), so it comes as no surprise that it seems to be topping the tech Christmas lists. Tech Giant Curry’s and PC world have released their top pieces of technology it expects to take pride of place under
-> Continue reading The Internet of Things Tops Lists This Christmas