Amanda-Jane Turner's Blog, page 4
December 23, 2019
Guest Post - Jacob Weller - The Worst #Passwords of 2019
Thanks to IT professional Jacob Weller who, being passionate about supporting others to increase their cyber security awareness, has kindly provided a guest post about the worst passwords of 2019.
So as xmas is upon us and the year draws to a close, I thought it would be a good timeto write my first security article..So here it is...
The Worst password of 2019...
This is a good time to remind everyone on how a simple but effective password can be your best defence against scams and...
So as xmas is upon us and the year draws to a close, I thought it would be a good timeto write my first security article..So here it is...
The Worst password of 2019...
This is a good time to remind everyone on how a simple but effective password can be your best defence against scams and...
Published on December 23, 2019 19:53
December 18, 2019
Guest Post - Shelly Mills - What does #phishing have to do with black juju?
Thanks to my colleague Shelly Mills for writing this post to provide an interesting look at phishing.
Phishing is a form of fraud used by scammers to steal sensitive information such as account credentials or banking information, by disguising emails to look like legitimate emails from reputable organisations and people you trust.
Because of the ease of sending bulk phishing emails, it has become a common method for criminals to use to try and obtain your...
Phishing is a form of fraud used by scammers to steal sensitive information such as account credentials or banking information, by disguising emails to look like legitimate emails from reputable organisations and people you trust.
Because of the ease of sending bulk phishing emails, it has become a common method for criminals to use to try and obtain your...
Published on December 18, 2019 20:45
December 14, 2019
Excerpt from book Unmasking the Hacker - DDoS and Botnets
It is Sunday 15 December 2019 as this is published and I am working on editing and writing more for my book and hope to have it in a good state to self publsh by by January 2020!
Updates of my book project are available from this page >> Book Updates << and once I have published it, this page will also have updates of new book projects and any giveaways associated with them.
Below is an excerpt of one of the chapters of my book "Unmasking the Hacker, Demystifing...
Updates of my book project are available from this page >> Book Updates << and once I have published it, this page will also have updates of new book projects and any giveaways associated with them.
Below is an excerpt of one of the chapters of my book "Unmasking the Hacker, Demystifing...
Published on December 14, 2019 07:00
December 9, 2019
#Cybercrime - five tech support scam mitigation tips
Also known as remote access scams, the criminal aims to convince their potential target that their computer has malware. Once they gain traciton with this story, the criminal then tells the target that they need to download remote access software so the computer can be fixed. These scams may be via cold calling, web site pop-ups or even via scam emails.
1. Remember that telecommunications and computer companies do not proactively call people unsolicited to tell them there is malware...
Published on December 09, 2019 00:42
December 6, 2019
#Cybercrime - Five points to consider
1. Anyone can fall victim to cybercrime. None of us are immune. Never believe yourselves to be above being scammed, as criminals can exploit that false sense of security.
2. Cybercrime is more than scams and malware, it also encompasses other cyber enabled criminal activities such as child exploitation.
3. Stay aware and share your knowledge of cybercrime, malware, scams, and other cyber enabled criminal activity to support others to also be vigilant.
4. The victims of cybercrime are not at...
Published on December 06, 2019 00:06
November 30, 2019
Excerpt from book Unmasking the hacker - The world of the web
<!--[if gte mso 9]>
Published on November 30, 2019 16:00
November 29, 2019
Protect yourself from #cybercrime - seasonal scams
Any significant retail event or seasonal holiday makes for great hashtagcybercrime attempts!
While people are looking forward to seasonal holidays, buying gifts and getting bagains, criminals are looking forward to exploit them.
Looking for online bargains? Please check the spelling of the link you are on as criminals buy and register web domains with common typos of well known stores. Just to trick shoppers and steal their PII and money.
So many successful seasonal sales on legitimate...
While people are looking forward to seasonal holidays, buying gifts and getting bagains, criminals are looking forward to exploit them.
Looking for online bargains? Please check the spelling of the link you are on as criminals buy and register web domains with common typos of well known stores. Just to trick shoppers and steal their PII and money.
So many successful seasonal sales on legitimate...
Published on November 29, 2019 18:40
November 23, 2019
Excerpt from book Unmasking the Hacker - phishing
It is Sunday 24 November 2019 as I write this. I am working on the draft of my book and hope to have it in a good state to do edits and rewrites in December to have it published by January 2020!
Updates of my book project are available from this page >> Book Updates << and once I have published it, this page will also have updates of new book projects and any giveaways associated wiht them.
Below is an excerpt of one of the chapters of my book "Unmasking the Hacker, Demystifing...
Updates of my book project are available from this page >> Book Updates << and once I have published it, this page will also have updates of new book projects and any giveaways associated wiht them.
Below is an excerpt of one of the chapters of my book "Unmasking the Hacker, Demystifing...
Published on November 23, 2019 21:55


