Understanding how to use your stimulus cheque

The COVID-19 pandemic threw the entire globe into disarray. Though many regions of the world are beginning to recover from COVID’s devastation, the current state of affairs is still relatively uncertain. Businesses and individuals alike are struggling financially due to many factors. The United States government attempted to alleviate this economic pressure by ...

read more

Garmin Wastedlocker Fiasco

Garmin. Wow. I am a Garmin user, and have been for quite a while. This Wastedlocker ransomware fiasco has sowed seeds of doubt in my mind about whether I should continue using Garmin services. Not only that, but it has also instilled doubt about their leadership and cybersecurity practices. The whole situation was a complete mess.

A bit of backstory for those that don’t know what happened. On July 23rd 2020 ...

read more

URL shorteners and security

I’m sure most of us have seen or have clicked on URLs generated by shortening services. The most popular being Bitly, and of course Twitter and other platforms also use shortened URLs. When I first stumbled across shortened URLs years ago, my first thought was that it looked suspicious. Even more than a decade later and I still have the same instinct when seeing them. These services are used primarily for marketing, with security being ...

read more

Zoom has acquired Keybase

Zoom has recently (yesterday at the time of writing) acquired the secure messaging app Keybase. Is this a good thing? After the proliferation of the COVID-19 virus, many people switched to working from home. This meant that online meetings and collaboration was necessary. The use of Zoom for video conferencing sky-rocketed, and this severely highlighted many ...

read more

Browser Security Tips

In the earlier days of computing and the Internet (I’m not that old, I swear) information wasn’t as easy to acquire as it is now. People couldn’t simply “Google” something and find it, you had to do a bit more digging. The backbone of the Internet was not created with security in mind. Protocols that transport the Internet’s data has had encryption and security ‘tacked on’ as an ...

read more