Alexa – can you eavesdrop on us please

After my post last week about the Panorama programme here in the UK, there was a story in the news today about a couple in the US who were surprised by a call from a friend who had been emailed a recording of their conversation. Read all about it here. And no, I couldn’t believe … Continue reading Alexa – can you eavesdrop on us please

Connected at home – what’s the problem?

You’ve probably heard by now of the Internet of Things (IoT). It’s essentially anything that is connected to the internet that isn’t a “standard” laptop or computer. But how secure is it? And how secure is your car? Just because your key fob is in your house doesn’t mean your car can’t be stolen. The … Continue reading Connected at home – what’s the problem?

I is for…

Integrity Along with confidentiality and availability, integrity makes up what is known as the CIA triad, the three main pillars that Information Security is built on. Integrity is all about making sure that data has not been changed or tampered with by unauthorised people. For example, if someone was able to access a hospital’s systems … Continue reading I is for…

DDoS – what’s that?

I’m sure that if you’ve been watching the news recently, you’ll have heard the phrase DDoS, which stands for Distributed Denial of Service. It sounds fancy and complicated, but it’s actually pretty straightforward. Let’s start at the beginning. A website is typically nothing more than one (or several, perhaps up into hundreds for some big … Continue reading DDoS – what’s that?