Category Archives: Blog

Gone Phishing

Anatomy of a Phish Phishing. We hear about it all the time, with warnings abounding [...]

Understanding Hash Values

What is that MD5/SHA-1/SHA-256 thing I see when I go to download an application? When [...]

Four simple tips to avoid being the low hanging fruit for cyber criminals

Before we start, relax! I’m not selling anything. If anything, I’m unselling. I’m not a [...]

Advice from the front line of Security – the SOC analyst

Security Operations Threat Analysis As we are all aware many organisations have adopted working from [...]

I’ve asked a forensics company to do some work for us. What should I expect back from them?

The background: Mary from Accounts, having fallen under suspicion for her snack purchases, has been [...]

The Importance of Rebooting

Why is reboot required? Rebooting helps the device to work better by clearing the temporary [...]

What is digital forensics all about anyway?

It’s a fair question. You might think something has happened on an electronic device, and [...]

Free Security Protection for Your Mobile Phone

Your mobile phone holds much of your sensitive and personal data and believe it or [...]