Monthly Archives: June 2012

Web Site Cookies: Advice On Their Use

The UK has recently adopted a law in line with European legislation covering the use of web site cookies. Anyone involved in the production of web sites that may use cookies should be familiar with the law any appropriate advice. … Continue reading

Comments Off on Web Site Cookies: Advice On Their Use

Someone pretending to be you?

Unfortunately email addresses can be spoofed relatively easily and an email can arrive in your inbox – ¬†apparently sent from someone you know – but they then deny ever sending it. In this respect, email is really no different from¬†traditional … Continue reading

1 Comment

Your LinkedIn Account May Be Compromised!

According to the Sophos Naked Security blog, there are rumours of the hashed password file from the LinkedIn site being found on hacking sites. If true it means that anyone with a LinkedIn account should consider their password compromised and … Continue reading

Comments Off on Your LinkedIn Account May Be Compromised!

Security Scans: What They Are, And Why We Do Them

It is possible that you may have heard of the IS Security team performing security scans of servers or networks. Those rumours are true. Of course what you may not be aware of is that other even nastier people are … Continue reading

Comments Off on Security Scans: What They Are, And Why We Do Them