Juice Jacking hits Mobiles hard

Protect yourself from Juice Jacking with a USB Condom. Juice Jacking is a technique used by cyber criminals that can compromise your mobile phone when you use a public charging port. These public charging ports are normally found in airports, waiting rooms and other public places. Cyber criminals hack these charging ports, which in turn … Continued

Hidden costs in Free File sharing services

File sharing services like Dropbox and WeTransfer help us share large files with each other. Those services are used because the files are too numerous and large to be transferred via email. Many of these free services come at a hidden cost, for their usage. For example if you read the Terms of Services of … Continued

Data Minimisation in GDPR

When it comes to storing processed data, the GDPR sets out some principles. Most importantly that data must stored for the shortest possible time and no longer than necessary. Legal obligations on how long that data can be stored must be taken into consideration. Storing the data for extended periods is only allowed for archival … Continued

From Phishing to Spearphishing

Phishing is sending an email to trick users into giving their confidential details. The more dangerous cybercriminal opportunists do Spear phishing. Whereas regular phishing targets various users that take the bait, spear phishing is aimed at particular users or groups, ideally for financial gain. The cybercriminal needs to gather information on the user or organisation. … Continued

Processing Sensitive Data

When processing sensitive data is desired, the confidentiality, integrity and availability of that data must be maintained at all times. Before collecting the data, there has to be a specified purpose for processing it within an agreed amount of time. Undefined purposes are not acceptable. Processing the data is limited only to the specified purpose … Continued