Apple Special Event and Security

Apple’s facial recognition has spurred a number of discussions about the privacy trade-offs in the iPhone X. Experts Weigh Pros, Cons of FaceID Authentication in iPhone X | Dark Reading – One concern about FaceID is in its current implementation, only one face can be used per device, says Pepijn Bruienne, senior R&D engineer at […]

The internet of hacking or WTF is happening with my smart home?

Mirai – is a bot network that is powered by a range of devices including infected home routers and remote camera systems. It took over these systems by using their default passwords. The network of compromised machines is then targeted to overload a target network or service. Last week the Dyn DNS service was targeted […]

The Yahoo! Data Breach Post

Yahoo! had a data breach in 2014, it declared the breach to consumers on September 22. This isn’t the first large data breach breach that Yahoo! has had over the past few years just the largest. In 2012, there was a breach of 450,000+ identities back in 2012. Millions of identity records were apparently being […]

The September 11 post

15 years ago I worked agency side in Haymarket in London’s west end  for Edelman. It was a normal day, well as normal is it gets when you are in the middle of the dot com bust fallout. My job meant working on communications programmes for the European subsidiaries of technology companies. This was to […]

Throwback gadget: SnapperMail

At the end of 2001, I started to prepare of leaving my job at Edelman. This meant upgrading my home IT set up. I picked up an iBook. The iBook was Apple’s consumer-orientated laptop made from 1999 to 2006. Mine was a second generation ‘Snow’ laptop with a G3 processor, dual USB sockets and a […]