Google Chrome Pushes for More Encryption on the Web

Google’s push for more encryption on the web has started with Google Chrome 68, the latest version of Google’s web browser. It comes with a new feature that will list all non encrypted websites as “Not Secure”. This change to Google Chrome means that all HTTP sites will now show a “Not Secure” icon in
-> Continue reading Google Chrome Pushes for More Encryption on the Web

Protect your data!

In recent news, documents have been found for sale on the dark web containing sensitive information relating to the U.S. Air Force. These documents were featured for as low as $100 to $200 and were found by Information Security Analysts while trawling through the dark web searching for criminal activity. These analysts posed as potential
-> Continue reading Protect your data!

Smart Locks

Tapplock is a popular, Bluetooth-based, fingerprint activated padlock. The speciality of this padlock comes down to the fingerprint recognition technology which allows users to unlock the padlock with their fingerprint or use a mobile application remotely. As an added benefit, you can even allocate trusted individuals who can also use the mobile application to unlock
-> Continue reading Smart Locks

Smart Watch-out!

In our previous blog, we spoke about the positives and negatives of using a smartwatch for your daily activities. Smartwatch security is a topic overlooked by most, and why? What potential does a smartwatch really hold? Let’s consider the core functionality a smartwatch. That is: to make calls, track health, send messages and access the internet.
-> Continue reading Smart Watch-out!

Malicious Applications: How secure is your mobile device?

Smartphones have become an icon in our day-to-day lives by providing a plethora of useful applications that make our lives easier. Whether it be helping you to sleep, eat well, exercise or socialise, there are plenty of advantages. However, with technology advancing so quickly, can you be sure that the applications you download are safe
-> Continue reading Malicious Applications: How secure is your mobile device?

Smartwatches: How times have changed

With the recent rise in “smartwear” technology, an increasing amount of people are beginning to see the benefits of wearing a smartwatch in day-to-day life – but are there any negatives to this technology craze? “What are they?” A smartwatch is the so-called “all-in-one” micro-solution to change your music, view texts, make calls, browse the
-> Continue reading Smartwatches: How times have changed

The Rise of Ransomware

Ransomware is being used widely by hackers to make money by holding your data hostage. As this threat evolves, can you be certain that the data you store is protected and are you able to recover it if you are attacked? This blog will cover ways to reduce the impact of ransomware by implementing practical
-> Continue reading The Rise of Ransomware

location security

Location Security

Cards and contactless payments leave an extremely detailed digital footprint that can be used to track individuals while travelling. However, do we think about the implications of our social media use during our trips from a safety perspective (location security)? The woes of various celebrities have been well publicized in the past. Sporting stars whose
-> Continue reading Location Security

3 Cyber Security Threats You Could Face

In recent years there’s been increase in the frequency and severity of individual people and groups attempting to expose flaws in security systems. There are a number of reasons why people attempt do this such as: access to private information, stealing accounts, or even to demand money from the victim of the breach. Below are
-> Continue reading 3 Cyber Security Threats You Could Face