WhatsApp was hacked. Are we surprised?

So there is yet another “hacking” scandal with a Facebook product. This time its WhatsApp, but really are we that surprised about this latest attack? WhatsApp messages are meant to be encrypted from end to end and not able to be read, one of the reasons that law enforcement are generally opposed to the product. The problem is that it is owned by FaceBook and we know how secure they are after leaving a few million usernames and passwords in the clear for a couple of years. (You can read about that fiasco <HERE>, <HERE> and <HERE>. The reality is quite different. The Vault7 release by Wikileaks.org states … These… Read More

Continue Reading

Cell Phone Carriers Are Secretly Selling Your Real-Time Location Data

If you were not aware, over the last week or so there has been a bit of a “kerfuffle” over the realisation that users telephone data is being commercially exploited by organisations such as LocationSmart.com. LocationSmart sells its data to companies for all sorts of reasons. In some instances it’s used to help local businesses send marketing text messages to customers visiting rival stores. In others, location data can be used by companies to track deliveries or shipments – or allow banks to track fraud if a person is making suspicious transactions within close proximity of each other.  The replacement or amendment to the Patriot Act, with HR 2058 -… Read More

Continue Reading

13 Settings you should consider for your Android

We have become dependent on our smartphones while at the same time the devices and apps themselves have become more sophisticated. There are many hidden functions in today’s smartphones that “leak” our personnel information. Whether this is using the GPS to track our location and push ads to us, or monitoring our keyboard input (to improve the user experience). A lot of this can be managed and controlled by setting up your phone “correctly” and being aware of your activity. . This video takes you through your Android phone and highlight some of the settings you should consider changing.

Continue Reading

NSA collects 530mn records in 2017

The US Government’s Office of the Director of National Intelligence (ODNI) has just released their mandatory report into the bulk collection of data, and it is shocking reading. (A copy of the full report is available HERE) Over the course of 2017, the National Security Agency (NSA) collected some 534,396,285 call detail records (CDRs), representing a dramatic increase over the previous year when, the agency gathered details of 151,230,968 calls, according to the report released by the Office of the Director of National Intelligence (ODNI). This shows the unabated infringement of the rights of US citizens caught up in this, and the arrogance of the US Government to think that… Read More

Continue Reading

The Dark Net isn’t what you think. Its actually key to our privacy

We hear a lot about the Dark Web or Dark Net and how it is a dark and evil place populated by drug dealers, pedophiles, hit men and arms dealers. Alex Winter researched and created a documentary  The Deep Web. This Ted talk is about that journey But what is it really? Why is it there and are there legitimate reasons for it? This Tedx Talk by Alex Winter, Bill from Bill and Ted’s movie franchise takes a personal look at why privacy is important and the Dark Web is a tool or enabler.

Continue Reading

13 Settings you should consider for your iOS device

We all have become more and more dependent on our smartphones while at the same time the devices and apps themselves have become more and more sophisticated. There are many hidden functions in today’s smartphones including accelerometers to say how fast you are moving, gps to say where you are, barometric pressure to tell you how high you are, and thats before we put our photos, banking and personal information in. This video takes you through the settings of the Android based phones and some of the settings you should consider changing.

Continue Reading

Introduction to TOR

By now we have all probably heard about TOR or as some call it the “Dark Web”, but not many of us know what it actually is, what it can be used for, and how to access it. There are many legitimate reasons to use TOR and the many benefits that it brings. Remember it was designed by the US Navy, so is it really only for nefarious purposes. So what can I expect from the video. Well as an introduction it will take you through what TOR is, the principles behind it, how it works and some of the tools you need to use TOR

Continue Reading
Business Pack phone services

Secure hosted phone service released

ControlYourComms.com launches a secure hosted phone service – Business Pack targeted at small businesses looking for all of the functionality of an enterprise PABX solution without the cost. Imagine having a call come into your mobile phone from an important client and needing to pass them onto another department. Normally, since it is a mobile, the general process is to tell the client he needs to call another department and hopefully you have a number. Not anymore. With the CYC Business Pack phone service, your mobile phone is an extension of your PABX meaning you can transfer calls, park them or be part of a hunt group if required. The… Read More

Continue Reading
Email-Encryption

Email encryption: Now more necessary

When considering controlling your communications, it would be folly not to consider arguably our most common form of communication, the humble email, and how important email encryption is. A Radicati Group Inc email study states In 2017, the total number of business and consumer emails sent and received per day will reach 269 billion, and is expected to continue to grow at an average annual rate of 4.4% over the next four years, reaching 319.6 billion by the end of 2021.(1) Our email tells a lot about us as we tend to not only use it for business communications but also for our personal communications. If you are using an… Read More

Continue Reading
Old Telephone Exchange

A brief history of telecom

  Software vs Hardware The telecommunications market is a different beast to what it was 10 or 20 years ago. A lot of the network these days, is run as software, creating virtual and not physical links. What does this mean for you? Well there is a lot more that you can do with software that you can’t do with hardware which means that you have a lot more flexibility in what services can be delivered and what limitations if any you put on them. With the computing power available, a lot of the devices, switches, firewalls and servers are all actually emulated in software. This means that you are… Read More

Continue Reading