A quick look at what a basic firewall is, and how it works.
Discussing some of the ways to prevent insecure direct object reference issues.
Analysis of some obfuscated VBScript that a malicious email wanted us to download.
Slides from my recent conference talk on the threat of security knowledge gaps.
How I got into cybersecurity - the story so far.
Having recently moved from Keepass to LastPass, I discuss my experience so far.
A plea to software vendors so we can all work better together.
Having worked with a few cyber security firms over the years, let's take a look at some of the findings.
How to access "app passwords" for your Google account, while also increasing your account's security.
Some simple preparations will help you get the best value from you penetration test. In this post I discuss some low cost suggestions.
Looking at why you shouldn't consider an email signature as ID.
A list of HTTPS inspection exceptions I've found are needed to work with Google services. Includes those needed for Chromebooks and the Google Play Store (Android app installs).
Confidence is something you have to develop, not just in yourself but also in the tools you use. How important is having confidence when it comes to IT?
I spent most of the final day of Infosec 2018 in talks. This post is going up later than planned as I've now processed what I saw / heard and, frankly, I'm no longer
A summary of talks I attended at Infosec 2018, day two.
Reflections on day one of my visit to Infosecurity Europe 2018.
An archived post from my previous blog, written in 2013. This kind of scam is still being used today.The good news is I didn't really get scammed, I knew what was happening
Should you clean or rebuild an infected computer? An old post from 2014.