This is an argument that has raged for several years now – and there is not an issue say answer. When we hear of an atrocity such as the one in London (03/Jun/2017) it is often followed by itv some statement or comment about radicalisation, possibly via the Internet. It is true that social media … Continue reading
An interesting statement from Dixons Carphone. It should be noted that this is listed as a potential breach, rather than proven. 1,200,000 personal records have been breached via unauthorised access. Additionally (in a separate incident), 5,800,000 chip and pin card details have been accessed and 105,000 non-EU card details that do not have chip and … Continue reading
I’ve seen a lot of these recently popping up and too many of my friends are being fooled for comfort. So I’ve created a few rules you can use.
The latest episode of Security Now shows how much changes and how much stays the same. One reason why Steve Gibson is so well respected in the IT/IS security field is the depth of his experience, something cannot be replaced or ignored. A constant over the past 8 years. Then we have security products and … Continue reading