Is your internet connection still using your ISP provided DNS servers? You could be leaving some easy performance, privacy and useful tools on the table. If you are using your ISPs DNS servers, they have full access to every site you go to on the net. This shouldn’t be an issue, except for the fact… Continue reading Everybody Loves DNS
Author: Cameron
Data Leaks
ABC recently carried a story which is becoming all too common. Amazon S3 data left open to the public with sensitive customer information exposed, in this instance, front and back scans of NSW drivers licenses and tolling notices. You don’t need too much imagination to see how harmful this information could be in the wrong… Continue reading Data Leaks
Safari Browser Exploit
Only a day after posting about making sure your browsers are fully patched, today I read about a currently still unpatched exploit (this is somewhat incorrect, as it has now been patched, but not released) in Safari on macOS and iOS. Until Apple release a fix, it falls to you to be aware of this… Continue reading Safari Browser Exploit
Update Your Browser
If you are using either Chrome, Opera, Edge or Safari, on Windows, Mac and Android you had best check for updates. A recently released vulnerability allows an attack that could be used to execute arbitrary code. The flaw ranks 8.3 out of 10 on the CVSS scale, making it a high-severity vulnerability. A fix has… Continue reading Update Your Browser
Ransomware and Backups
Backups are important, we all know it. Especially in this age where one of the more common forms of malware out there will lock your files away from you until you pay a ransom. Paying the ransom does not ensure that you will get them back, or that your files will not also be sold… Continue reading Ransomware and Backups
Malware
What is malware? Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software. [Source: Wikipedia.com] How did I get… Continue reading Malware
Password Security
Someone being able to get a hold of or crack your passwords can wreak havoc on your life in many ways. If it’s your email, then many other sites will use that to do password resets (the “forgot my password” button) unless you are also using 2 factor authentication. Even worse, many people also reuse… Continue reading Password Security






