How do I secure my social media profile?

Quitting social media entirely can be unrealistic, or at least seriously unfun. So it’s important to take a moment to check out account settings before you start, to make absolutely sure you’re okay with the service’s default settings.

Read more

Verified Twitter accounts compromised, get busy spamming

Verified Twitter accounts tend to be a little more secure than those belonging to non-verified users due to the amount of extra hoop jumping required to get one of those ticks in the first place. A number of security requirements, including providing a phone number and setting up 2FA, are all things a would-be verified Twitter user needs to do. Unfortunately, things can still go wrong…

Read more

Selfie safety: keeping your security picture perfect

Selfies! Everybody likes the odd selfie, but are you keeping good security practices in mind when setting up the shot? There are dangers both online and off. We take a look at the latest possible security issue stemming from a quick snap, along with some of the things you should (and shouldn’t) be doing when lining up your latest photo.

Read more

Scam as a service 2: the B team

Interest in Tor based threats is increasing to the extent that some vendors will scoop up all activity they find on Tor and provide you a nice front end to search through it at your leisure. This might lead the casual observer to assume that the darkness is a one stop shop for cyber threats, but criminals existed on the internet prior to Tor, and still do quite well for themselves without it. In fact, bad guys with good OPSEC tend to be the exception, rather than the rule. So let’s take a quick look at some unpleasant stuff and the nadir of bad OPSEC, Facebook.

Read more

A week in security (Oct 09 – Oct 15)

A compilation of notable security news and blog posts from the 9th of October to the 15th. This week, we touched on threat modeling, a PUP, IRS fraud, and laws concerning the usage of social media in the UK.

Read more

Select your language