Amanda-Jane Turner's Blog
November 14, 2021
What is #cybercrime?
When cybercrime s mentoned people may immediately think of malware, others may think phishing, however cybercrime is far more than that. Cybercrime is crime against technology or crime enabled by it. This means that as well as perhaps the more obvious crimes of malware and phishing, it encompasses online fraud, unauthorised modification or destruction of data, romance fraud, tech support or remote access scams, child abuse material, and a range of other crimes.
Remember that anyone can become a ...
October 21, 2021
#cybersecurity - 5 points about vulnerabilities and patching
Software and technology evolve fast, and at times they may have an inadvertent flaw in them. Vulnerabilities in technology or software code can be exploited by criminals to gain access to a person’s computer or phone, or a company’s system. The reason why software companies release security patches is to fix or mitigate security flaws that have been discovered in their code
Five points about vulnerabilities and patching:
1. Vulnerabilities – A flaw in code, hardware or systems may be exploited ...
October 12, 2021
Guest Post - Ella Donald - How do I spot a #phishing scam? #cybersecurity
Thank you to my lovely colleague, Ella Donald, for generously taking time to write this article supporting the demystifying cyber project and helping people to stay safer from cybercrime.
How do I spot a phishing scam?As society becomes more digitised, our lives are increasingly conducted online. We must give our banking details, identifying information, and more to many sources, and may be prompted to provide them again. Our email inboxes are, more than ever, a receptacle of sensitive informatio...October 3, 2021
Guest Post - Simon Stahn - So, you want a new IOT device in your home ... #cybersecurity #IoT
\So, you want a new IOT device in your home… how do you go about evaluating its risks to you and your environment?Let’s reduce this t...
September 20, 2021
#Cybersecurity - least privilege
If a criminal manages to access a computer or system via administrative privileges they can hide their tracks, exfiltrate data, and ensure they remain undetected for a long period of time. If however a criminal gains access to the computer system credentials of a person with limited access, then the criminal is restricted on what they can do....
August 19, 2021
Guest Post - Craig Ford. - The road less travelled
Thank you to author and infosec profesional Craig Ford, for writing this article and supporting the demystifying of all things cyber. If you are looking for your dream career in cybersecurity, infosec, all things cyber, this article will be of interest to you.
If you use Goodreads, please follow Craig's author page on Goodreads.
.........
The road less travelledWhat is the right path for you to get into cybersecurity?Honestly, I have absolu...
July 26, 2021
Guest Post - Rajitha U. - Responsible Disclosure
Thank you to the highly respected infosec professional, Raj, for writing this article on responsible disclosure of exploitable vulnerabilities. This artilce highlights the reasons for being carefull how vulnerabilites are disclosed, adn the ethical approach to this disclosure.
.........
A few days ago, I saw one of the cybersecurity enthusiasts publish a post on how he found a brand-new vulnerability affecting a network security device. No d...
July 9, 2021
#cybersecurityFAQ - Does HTTPS mean the site is safe?
The Cybersecurity FAQ series, in the Demystify Cyber project's blog, looks at some commonly asked questions about cybersecurity and cybercrime. If you have a query you would like covered in a future blog post please contact Demystify Cyber via the contact form.
________________________________________
QUESTION: If the website has HTTPS does that mean it is safe?
ANSWER: HTTPS means the web traffic is encyrpted for data transmission security but does not mean the website is safe.
The Hypertext Transf...
July 5, 2021
10 cybersecurity essentials for individuals
If you use connected or connectable technology in any form it is essential you do what is in your power to help protect your information, finances and accounts. Although cyber security can seem daunting, it is just another avaneue of life we need to learn to be secure in. From a young age you may have learned about keys and locking doors, or looking both ways before crossing a street, let's make cybersecurity as easy to understand!
Here is a list of some achievable basic cybersecurity essentials...
June 24, 2021
Guest post - James Meikle - BBQing #Risks Steakments (Statements)
Thank you to James Meikle for contributing his expertise to support the Demystify Cyber project.
........................
BBQing Risks
Risk statements have the power to deliver a strong message to people from all backgrounds on something bad that might happen. To be clearly understood common language should be used. There are a few different ways to formulate risk statements this is just one of the common ones.
PS: We all need an acronym swear jar!
As I would like to see ...


