Twitter

Twitter Upping Security

Twitter has recently announced that they have automatically activated extra account protection for US politicians and key persons in the upcoming US election. Twitter are prompting key individuals to make immediate changes to their account security after one of the most prolific hacks of social networks happened to twitter in June. The hack in June[…]

iOS14

iOS14

Apple’s iOS 14 is soon to launch for the new iPhone. It is a momentous leap in privacy, but Facebook has confirmed it could be their worst nightmare. It’s September, which means the new iPhone and the all new iOS14 is imminent. But its seemingly not all good news for social media giants such as[…]

GraphQL, a new option for API creation

As software engineers, we are extremely familiar with the core functionality of REST for APIs. Recently, a modern alternative, named GraphQL, has been developed to provide improved flexibility of queries when compared to the comparative static nature of REST APIs. GraphQL has been developed to mitigate the existing problem inherent within REST APIs, Overposting, where[…]

breaches

Breaches at scale – a look into BlueLeaks and protecting your data

Data breaches have always been an understandably worrying topic for most. The fear of having your information; your name, address, contact information or even credit card information is one of the largest concerns when considering digital security. In most recent events, nearly 270 gigabytes of data have been leaked and published in the latest release[…]

Permissions

Permissions on mobile devices

Application permissions govern what the application can access on the mobile device. These are a protective barrier between the developer of the application and the sensitive information stored on the user’s device. When the user installs the application for the first time the application will ask for permission for a feature. For example, a map[…]

Insider Threat

Insider Threat

Insider threat has been a long-standing concern amongst business, and there are important considerations from both an operational and a security perspective to manage, mitigate and respond to risk appropriately. This is not strictly limited to the employees currently in the business, but also those who have previously left. Insider threat is designed by any[…]