British Gas discovered the existence of natural gas in the Gaza Marine fields, 20 nautical miles off the coast of Gaza in 1999. In 2008, in total contravention of international laws, Israel declared sovereignty over the Gaza Marine area. In 2022 President Joe Biden and Egyptian government officials pressured Israel to pursue the development of …

Continue reading

  When you delete files on your computer, you are usually just deleting a link to the place on your hard drive where the data is stored. Before selling, donating, or throwing out any devices, it is advisable to wipe the drive to prevent anyone retrieving your private data, such as email, banking details, or …

Continue reading

I saw this image on Bluesky. It sums up a lot of people, and is worth sharing in my opinion. No one’s asking you to change your beliefs. they’re asking you to stop using those beliefs as an excuse to treat people like trash.

Multi-Factor Authentication (MFA) MFA can help avoid nearly all account takeovers. Using MFA to keep your online accounts secure, as the name implies, is better than 2FA. Upgrading your security to MFA is highly recommended, because the crooks who want to access to your accounts keep increasing their methods of attack, you should increase your …

Continue reading

A SIM swap scam is a type of fraud where criminals take control of a victim’s phone number by tricking the mobile carrier into transferring the number to a SIM card they possess. This allows them to intercept calls and texts, including security codes, enabling access to the victim’s accounts. The attacker collects information about …

Continue reading

Three distinct types of Bluetooth Hacking: Bluejacking Mainly a nuisance, but has the potential to be malicious Bluesnarfing A more serious attack that can gain access to passwords, email and photos. Information gained from this type of attack can be used for identity theft. Does no leave any trace. Bluebugging The most dangerous type. It …

Continue reading

  Your computer can be infected with malware just by landing on a website that that has been compromised by an attacker. This is called a Drive-by Download. The attacker uses an Exploit Kit to exploit vulnerabilities in your system. The attacker does not need to have advanced computer knowledge to carry out this type …

Continue reading

Last year the NIST recommendation for password length was a minimum of 16 characters, preferably more. The examples shown in the Password strength chart below, are the type that have been generated by a Password Manager. Click image to expand. Using a Password Manager enables you automatically generate a new password at whatever length you …

Continue reading