Security essentials: What is two-factor authentication?
It's National Cyber Security Awareness Month so we're going back to basics and looking at two-factor authentication.
View ArticleOnline safety is our shared responsibility
Yesterday was World Mental Health Day. It coincided with the year anniversary of Amanda Todd's death, who committed suicide after sustained online bullying. So, with this in mind, we ask what can be...
View ArticleSecurity begins at home - how to do a "back to basics" security overhaul on...
Sophos security expert John Shier explains how he carried out a "back to basics" security overhaul on his family network. He wrote it up as a handy checklist for anyone else acting as in-house IT...
View ArticleLightbeam shines a light on which websites you're really visiting
Do you really know where your browser goes when you type a URI into its address bar? Do you realise that that your browser not only accesses the site you intended but may also have visited 3rd party...
View ArticleSecurity Essentials: What is PCI DSS?
Many of us know what PCI DSS stands for, but we haven't actually read through the standard. John Shier was one of them - so he decided to put things to rights...
View ArticleNIST to review standard for cryptographic development - do we really care?
Whether you use it to protect personal data, protect customer data or secure your communications, cryptography is an integral part of our digital world, but the announcement late in 2013 that NIST is...
View ArticlePCI DSS - What's new in v3.0?
If the PCI DSS applies to your business you should also know that the document has been updated. With nearly 100 changes, the current version has incremented one full revision and stands at v3.0. We...
View ArticlePCI DSS - Why it works
John Shier takes a look at five ways he thinks the Payment Card Industry Data Security Standard (PCI DSS) works.
View ArticlePCI DSS - Why it fails
John Shier takes a look at five ways he thinks the Payment Card Industry Data Security Standard (PCI DSS) fails to meet its goals.
View ArticlePhish or legit - Can you tell the difference?
If a legitimate email looks like a phishing email, then how are you supposed to spot what is genuine and what isn't? John Shier takes a look.
View ArticlehitchBOT - Privacy invading hitchhiking robot or fun social experiment?
Introducing hitchBOT, a science meets art project, getting ready to hitch 6158 km across Canada from Halifax to Victoria next month.
View ArticleTwo-factor authentication: Understanding the options
Which is better, "two-factor authentication" or "two-step verification"? Should you choose a token, SMSes or an app? John Shier helps you understand the various sorts of 2FA...
View Article5 minute fix - How to use a password manager
This 5 minute fix will show you how to choose and use a password manager.
View ArticleBlackshades RAT co-author sentenced to 57 months in prison
Alex Yucel, co-creator of the Blackshades Remote Access Trojan (RAT), has been sentenced for selling and distributing the malware since 2010.
View ArticleWhen the government really IS here to help with cybersecurity
Thanks to Edward Snowden, governments aren't looked upon very favourably by the security and privacy conscious. But they're not all bad. John Shier takes a look.
View ArticleIs the Angler exploit kit dead?
The Angler exploit kit faded out before, but it soon came back. Are things different this time? Is it gone for good?
View ArticleFBI or no FBI – how one man says he can crack an iPhone for less than $100
The FBI said it wasn't possible but a University of Cambridge researcher has proved them wrong.
View Article