Have you ever struggled to remember a username or password? Join the club. Wouldn't it be great if you could log in to every site using the same password, without compromising your security? Now you can! Introducing AgileBits 1Password, the gold standard in decentralized identity & password management for Windows,| Paul Moore
In July 2020, I ordered a takeaway from Napolis Pizza. Like many firms across the UK, they use ZPos for their websites and electronic point of sale. A snazzy website, simple & easy to use ordering and minimal processing fees (compared to others in this space), it seems like a| Paul Moore
Apart from leaking everything, there's been "no breech". Avoid Tiffin Tom.| Paul Moore
Possibly the clearest, most concise password advice you'll read today.| Paul Moore
Over the last 2 years, ASDA have processed over 19+ million transactions on a demonstrably insecure site.| Paul Moore
The risks of failing to validate an email address...| Paul Moore
Reviewing the "production" build of CyberAlarm. Good grief - you couldn't make it up.| Paul Moore
A brief review of CyberAlarm uncovers several serious concerns. Please read this before you deploy it.| Paul Moore
3 attempts, 3 complete failures. Incredibly, cyberAlarm is now even worse than before.| Paul Moore
A calm, sensible discussion about the benefits & pitfalls of Password Managers... and the implications on privacy.| Paul Moore
A brief demonstration of how a default configuration can destroy your privacy & security. Hijacking a VoIP phone with just a browser.| Paul Moore
How two simple exploits allowed access to a million mobile accounts (calls & SMS) and online banking.| Paul Moore
Disabling paste on password fields can increase security... despite claims to the contrary.| Paul Moore
In 2015, the UK government released an article advocating the use of 3 random words in passwords, citing "pragmatism and algorithmic strength against common issues like brute force attacks". #Thinkrandom when creating passwords – #use3randomwords to make them https://t.co/6BlS8EqK7v pic.twitter.com/qtA43ffLf6 — Cyber Aware (@cyberawaregov) April| Paul Moore
You can be identified by how you type, even behind proxies and Tor. Protect yourself with KeyboardPrivacy.| Paul Moore