January 2, 2019
This was going to be a comparison of major phones, breaking down some of the exploits and weaknesses. I was potentially going to compare IOS to Android and throw fuel onto an already raging fire amongst smart phone enthusiasts which is, if you’re listening to a podcast, all of us. Maybe you’re not a geek or a gadget nut but you’re probably far more dependent on that device that you may realise. You’ve probably never really put a great deal of thought into how much of YOU is locked up in that phone. You might even have a Kanye-West style pin code like 000000 to unlock it (if you didn’t see the article I posted on the Codifyre Facebook page about the worst passwords and pin-codes of 2018, it’s worth a read. Kanye tops the bill.
Let’s start with what’s in your phone.
Follow us on...
May 23, 2018
Is it cast aside teenage wunderkinds who can seemingly dissect all things computer with the crack of a laptop to create designer chaos? They are portrayed smoking cigarettes, roller blading and always have media savvy branding! Too cool!
Any time a major breach is announced, the media conjures up their classic image of this hooded jedi-like figure in a dimly lit room with 0s and 1s swirling about. Film and TV has done a superb job of portraying our favourite computer hacker as the stereotyped quirky yet heavily crafted indie kid who wields the required dexterity to power-type at a moments notice, anywhere on the planet and inject themselves straight into anything from corporate servers, to traffic light control systems to Dinosaur based fun parks. It usually involves some superb visualisations of neon landscapes and swirling equations.
In the episode I unpack hacking and what it really is, with a few notable examples from the past few years.
Warning! I may debunk Hollywood's sexy portrayal and expose hacking for what it really is... good ol' fashioned elbow grease.
The shownotes for the episode are here.
Follow us on...
March 7, 2018
Let me go back to the beginning. 1990!
Shortly after the earth cooled and life began, Sir Tim Berners-Lee just decided to invent the world wide web. This was approximately 1990 give or take any prior research and general acceptance of the idea. He also put together the first browser confusingly and yet inspirationally called "WorldWideWeb".
Well now you know how that all started and why it's called what it is. For those of you who were toddlers or perhaps not even born yet a world without the web sounds like a time when everything was in black and white, lit by open flame, the notion of evolution was exciting and new and tablets were made from stone.
Since then things have evolved. The browser which began as a simple visual interpretation of a "markup" language used to create a textual representation of visual elements is now a dangerously functional run-time environment potentially comparable to our host operating system, more than you might expect.
Read the show notes at...
Follow us on...
January 25, 2018
Passwords are a pain in the a$$. In fact, in an interview with The Wall Street Journal, Fernando Corbató, now 91 years old and the inventor of the password back in the 60s said that passwords have become “kind of a nightmare”.
The current state of the internet wasn’t quite a consideration when passwords first started. Nowadays the average internet user can have upwards of 100-150 different accounts across multiple services. You might be thinking… not me! When was the last time you actually tallied up all your online identities. You might be surprised. Each service is now putting sufficient password restrictions specifically force you away from the password top 10 list, but ensuring that you’ll probably forget what your password is… unless… you have a system. A clever system!
In out last episode we talked about bad passwords (the top bad passwords in fact), what makes a good password and how you can make something up that is easy for you to remember but hard for machines to guess.
This week we talk about password managers. We include browsers in that as well. We discuss the reason behind using password managers and offer suggestions for they can improve your standard of password hell provided you obey a few dos and don'ts.
Finally we end with two factor authentication and the different options for really ensuring you take your personal security to the next level starting with defining authentication mechanisms as
Something you know (eg. a password)
Something you have (eg. your phone)
Something you are (eg. your fingerprint)
For more details please check out the blog for this show at
Our Facebook Page
Let's twitter as well
November 14, 2017
This is one of those subjects that has struck everyone from the techno security guru to the average person who might simply be trying to do their job. Ransomware brands such as Goldeneye, Petya (and its counterpart NotPetya), Cryptolocker, CryptoWall, Locky, WannaCry and very recently, Bad Rabbit (to name only a few) have been making headlines across the globe.
I’ll start by taking a quick step back and just define Ransomware before I discuss how it tricks us into letting it in the door. I'll then take you through the stages of it's existence and finally what we can do to be better in the face of quickly advancing and mutating Ransomware attacks.
2017 was the year of the Ransomware... or is it? 2018 is just around the corner so only time will tell.
Check out the full blog article based on this podcast on the Codifyre website.
Follow on twitter http://www.twitter.com/codifyre
Like on Facebook http://www.facebook.com/codifyre