Featured Post
AI Harvesting Personal Data
A recent AI trend is the creation of personalised doll images. On the surface this is a fun spin off of AI although some …
By Grayde Bowen | 23/04/2025
Read post
By Grayde Bowen | 14/09/2022
UK Register of Cyber Security Professionals?
UK Plans to Create a Register of Cyber Security Professionals The UK is considering chartered Cyber Security professional status. Top professionals will be registered …
By Grayde Bowen | 14/09/2022
Reacting to Ransomware
Reacting to Ransomware Ransomware continues to be a major threat to computer systems. Attacks on high profile users make the news headlines but there …
By Grayde Bowen | 14/09/2022
Ukrainian Cyber Threats
Ukrainian Cyber Threats The current (March 2022) conflict between Ukraine and Russia is expanding into cyberspace and may affect computer systems Worldwide Politically motivated attacks …
By Grayde Bowen | 14/09/2022
Zero Trust Security
Zero Trust Security Zero Trust is not a single off the shelf solution. It is best thought of a buzzword that describes a strategy …
By Grayde Bowen | 14/09/2022
Nation State Cyber Attacks
Nation State Cyber Attacks No target is too insignificant for the big player hackers. Compared to the costs of conventional weapons; cyber is a …
By Grayde Bowen | 14/09/2022
Passwordless Authentication
Passwordless Authentication The need to remember and input passwords to access data may be coming to an end Passwords are a core issue in …
By Grayde Bowen | 14/09/2022
QR Code Scams
QR Code Scams Mobile phones may open QR codes without checking if the content can be trusted. QR codes seemed to be going out …
By Grayde Bowen | 14/09/2022
Secure Data Deletion
Secure Data Deletion Deletion or overwriting is no longer a good enough solution to erase data from a computer In October 2021 Wired magazine …
By Grayde Bowen | 14/09/2022
Stopping Stalkerware
Stopping Stalkerware Stalkerware has grown out of applications designed to allow parents and guardians to monitor their children’s activity and theoretically prevent them from …
By Grayde Bowen | 14/09/2022
Rubber Duck Danger
Rubber Duck Danger USB drives have provided a challenge to network administrators for many years. Despite the growth in cloud storage, WiFi and cellular …
By Grayde Bowen | 14/09/2022
Who’s Looking At You
Who’s Looking At You As facial recognition software has become more reliable it is entering that grey area between personal security and personal privacy. …
By Grayde Bowen | 14/09/2022
COP26 and Computer Sustainability
COP26 and Computer Sustainability COP26 ran in Glasgow from 31st October to 12th November. The conference was attended by World leaders and delegates discussed …
By Grayde Bowen | 14/09/2022
Location Data Privacy
Location Data Privacy Accurate information on population movement has become a marketable commodity and this has encouraged some shady practices amongst mobile app developers …
By Grayde Bowen | 14/09/2022
Shaken And Stirred
Shaken and Stirred The plan to block scam phone calls Hacks and scams often depend on gaining the trust of the mark. This is …
By Grayde Bowen | 14/09/2022
EU ePrivacy Regulation 2021
EU ePrivacy Regulation 2021 With a ‘cover’ date of 2021 the ePrivacy Regulation was originally expected to be in force from 2018 to compliment …
By Grayde Bowen | 14/09/2022
Bitcoin – The Hidden Costs
Bitcoin – The Hidden Costs On 7th September 2021 El Salvador recognised Bitcoin as its legal currency (together with the US$) but what are …
By Grayde Bowen | 14/09/2022
Lateral Spear Phishing
Lateral Spear Phishing A phishing email that comes from a recognised business contact is more likely to be opened than random spam. Phishing emails …
By Grayde Bowen | 14/09/2022
Desktop Sharing Woes
Desktop Sharing Woes Following on from Kindus’ blog on the unsecured risks of remote meetings it is time to consider the perils of sharing …
By Grayde Bowen | 14/09/2022
The Walls Have Ears
Homeworkers Beware – The Walls Have Ears During World War 2 the British government put up a range of posters on the theme of …
By gabe | 14/09/2022
Vulnerability Management in the Age of Cyberattacks
For a twenty-first-century business, vulnerability management has become an essential part of day-to-day operations. Every application you use has vulnerabilities. Cybercriminals use these weaknesses …
Sign Up
Sign up to our newsletter list here.
Successful sign up
Thank you for signing up to our newsletter list.
Check your inbox for all the latest information from Kindus
We use cookies on this website, by continuing to browse the site you are agreeing to our use of cookies. Find out more.