Personal Passwords At Work

Although many big companies like Microsoft are trying to eradicate the need for passwords, they are still heavily used to secure our accounts and systems. These accounts and systems can be for personal use or for work......

Enabling Fingerprint Lock In WhatsApp

WhatsApps is already secured from a communication point of view due to end-to-end encryption being enabled by default. What is doesn't enable by default is the privacy lock. This means if someone was to use your phone, they could easily read your messages.......

Phish-Friend Privacy Policy

Thank you for your interest and hopefully Phish-Friend can help educate you on how to spot Phishing attempts. I created it to help fight the war on Phishing. The extension is designed for personal use. What Data Do We Collect? The Phish-Friend Chrome Extension does not store, share or collect any information from it's users.... Continue Reading →

DoH – DNS over HTTPS

Seeing the little padlock next to the URL is starting become the norm when surfing the internet. Site owners are starting to make the effort to implement better security controls in order to secure their site. Even malicious parties are bothering to do......

Finding Access Anywhere Servers Using Certificates

Remote users are a part of every organization and the need to provide external access can be a real problem. For the bigger organizations, they will most likely implement several security controls in order to isolate their users from the rest of the internet. For some, they may want to go for the cheaper option to provide remote access......

Google Calendar – “Free iPhone Phish”

If suddenly you find that Google Calendar is telling you to pick up that iPhone 11 you've won, don't worry, you've not been hacked. Most likely what has happened is that a Phishermen has sent multiple calendar invites to you knowing that they can abuse Google Calendars default event settings.......

SMB Relay Attack

SMB is commonly used for sharing files, printers and communication often between client to server. Before a client can communicate with the server or another client though, they will be required to authenticate themselves. This is simple access control.....

Create a website or blog at WordPress.com

Up ↑