Clearing up some common misconceptions about web and IT security.
There are a lot of opinions bouncing around the web that through Chinese whispers or repetition have become sudo-facts. In this post I hope to dispel some of these popular myths. Unfortunately there are not always simple solutions to life’s problems but being aware of them is often enough to help. Continue reading
Details of another mobile app that demands too many privileges.
I came across this application a few months back; I wasn’t impressed with it then and nothing has changed. A friend sent me a text message this morning singing its praises and suggesting I install it. Unfortunately that friend is not very tech savvy and was all too quickly impressed by the shiny shiny marketing to bother looking at the details. Continue reading
Why you should be cautious about giving away too much personal information.
Following an earlier post about giving away privileged access to your informationI’d like to outline how you can unwittingly give away bundles of seemingly innocent information that could be used against you.
(For those of you wondering, Pii stands for Personally Identifiable Information and Tmi stands for Too Much Information)
Clearing up some common misunderstandings and inaccurate reports in the news.
In recent months there has been a lot of coverage on web and IT security breaches but unfortunately the news outlets don’t always get it right. Sometimes this is because of a lack of understanding from the ‘journalist’ which might be understandable in the more complex cases, if it weren’t their job to research and report on facts. Sometimes it’s outright sensationalism and scaremongering when ratings and sales take priority over reporting the news.
In this post I hope to clear up some of the common mis-informations that crop up in the news…
A quick look at the setup I use to browse the web more safely than the average Joe.
I don’t often make recommendations because such things have a way of back firing. Instead I’d like to outline a few bits of my setup that helps me to browse the web with a little extra piece of mind. If you feel like trying any part of this then please acknowledge my usual software disclaimer.
Details of the permissions and privileges that you need to hand over to Facebook in order to use their mobile app, outline with Android.
The Facebook App for Android has changed quite a lot since I originally wrote this article so I figured I should update to reflect the changes in permissions that the app now requests. There are some improvements and looking back I think I was a little harsh in my judgement with a knee-jerk reaction but the problems remain that the permissions seem too lenient, there is no justification of why the Facebook app needs these permissions, and the only choice we have is to accept them all or not at all.
Some quick pointers on making your Twitter account more secure.
It only takes a few minutes and a few mouse clicks to clear out some rubbish that might have accumulated around your Twitter account and tweak a few options to make it a little more secure.
Here I’ll briefly show you how…
Clearing up some misconceptions on passwords and some suggestions on picking stronger passwords.
If you want to interact with a website rather than just browsing, you’re probably going to have to create an account and that account is probably going to be protected with a password. Some websites ask for more information than the average census but a username and password will be the basics.
Typically then we each deal with several passwords on a daily basis but passwords are not without risk. Here I look at the problems with passwords and a few tricks for picking strong yet memorable passwords…
Some suggestions on how to improve the security of your computer.
With the increasing number of threats that are spreading across the web it can be difficult to know how best to protect your computer. What do you need to protect against? Will one tool protect you on all fronts? Do you get what you pay for in a tool? Can a free tool be good enough?
I’ll try to answer these questions and give some idea of what to look out for…
An insight into secure web browsing. Part 2.
In a previous post I gave a quick overview of SSL and HTTPS, what it is, what it means and what it looks like. This time round I’ll give a run through of where you should expect to find HTTPS, when you should aim to use it and when there’s no need to worry.