This post is aimed at addressing what phishing attacks are, the damage they can do, and how to spot them. Phishing attacks are very common and apply to everyone. It’s important to know they can target you in your personal life and in work. What Is A Phishing Attack? Phishing attacks are when attackers attempt…
What is the Cyber Essentials Scheme? Cyber Essentials is a government-backed scheme to improve the cyber security stance of businesses. The idea behind the scheme is to raise the bar of business in the UK concerning their approach and readiness for cyber incidents. It is also now a requirement when bidding for government contracts. Should…
Introduction On March 29th, 2024, a backdoor in a popular package called XZ Utils was identified/announced. In true fashion, the cyber security industry was thrown into panic on a Friday. Not only was it a Friday, but it was a bank holiday Friday for some… so we had an extra treat! In this post, we…
Introduction Good security practice for individuals is still something that most people don’t do, sometimes because people see it as too much additional effort or because people don’t realise the importance of cyber security and what consequences can come from a lack of it. In this post, we’ll look at the importance of a specific…
Introduction As with all Cyber Security blogs, it’s an unwritten rule and requirement to have a post about HTTPS… so here we go. In the ever-evolving landscape of the internet, you may have encountered the term “HTTPS” while browsing the web. But what exactly is HTTPS, and why does it matter? And more importantly, when…
What is HackYour.Tech? HackYour.Tech is a new Cyber Security focused blog run by two techs currently working for a large consultancy firm. Our daily focus covers a wide range of areas, such as DevSecOps, Penetration Testing, Network Administration and a lot of code. Why Are We Doing This? At the heart of our mission, and…