In July 2020, I ordered a takeaway from Napolis Pizza. Like many firms across the UK, they use ZPos for their websites and electronic point of sale. A snazzy website, simple & easy to use ordering and minimal processing fees (compared to others in this space), it seems like a| Paul Moore
Everykey is a Bluetooth device or smartphone app that replaces your keys and passwords. Using military grade security, Everykey unlocks your phone, laptop, and more!| everykey.com
Apart from leaking everything, there's been "no breech". Avoid Tiffin Tom.| Paul Moore
Possibly the clearest, most concise password advice you'll read today.| Paul Moore
Over the last 2 years, ASDA have processed over 19+ million transactions on a demonstrably insecure site.| Paul Moore
The risks of failing to validate an email address...| Paul Moore
Reviewing the "production" build of CyberAlarm. Good grief - you couldn't make it up.| Paul Moore
A brief review of CyberAlarm uncovers several serious concerns. Please read this before you deploy it.| Paul Moore
3 attempts, 3 complete failures. Incredibly, cyberAlarm is now even worse than before.| Paul Moore
A calm, sensible discussion about the benefits & pitfalls of Password Managers... and the implications on privacy.| Paul Moore
A brief demonstration of how a default configuration can destroy your privacy & security. Hijacking a VoIP phone with just a browser.| Paul Moore
How two simple exploits allowed access to a million mobile accounts (calls & SMS) and online banking.| Paul Moore
Disabling paste on password fields can increase security... despite claims to the contrary.| Paul Moore
In 2015, the UK government released an article advocating the use of 3 random words in passwords, citing "pragmatism and algorithmic strength against common issues like brute force attacks". #Thinkrandom when creating passwords – #use3randomwords to make them https://t.co/6BlS8EqK7v pic.twitter.com/qtA43ffLf6 — Cyber Aware (@cyberawaregov) April| Paul Moore
You can be identified by how you type, even behind proxies and Tor. Protect yourself with KeyboardPrivacy.| Paul Moore