The Vital Importance of Regulations, Guidance, and Best Practices for Application Security

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

In our everly increasing, interconnected world, the security of applications is of utmost importance. Cyber threats are constantly evolving, targeting

Read more

Implementing a Vulnerability Disclosure Policy: A Definitive Guide [NCSC Toolkit V2 – Deep Dive]

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

In an era where security vulnerabilities are discovered frequently, it’s crucial for organizations to have a process in place to

Read more

Cybersecurity on a Small Business Budget: Adapting to the Modern Threat Landscape

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

As a small business owner, you might feel a bit like David in a world of Goliaths, as they say,

Read more

Twitter discontinues text message two-factor authentication for non-Blue subscribers

In a controversioal move, twitter has recently announced that it is discontinuing the use of text message two-factor authentication for all users, except for those who subscribe to Twitter Blue. This means that users who have relied on SMS-based two-factor authentication to protect their accounts will now need to switch…

Read more

A Lesson in Privacy: The ChatGPT Bug and Its Implications for AI Conversations

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

The world of AI-powered conversation platforms has been rocked by a recent incident involving ChatGPT, a popular AI chatbot developed

Read more

Google to pay $29.5M to resolve two legal claims related to its location tracking policies.

After the states filed two cases against the firm accusing it of having tracked customers’ locations without their express agreement,

Read more

LastPass finally admits attackers have a copy of customers’ password vaults

Customers of password manager LastPass have been informed that during the attack on its servers in August 2022, unidentified persons

Read more

End 2 End Encryption (E2EE) Is Finally here, kind of, for Apple Device Backups

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

According to a new optional feature called Advanced Data Protection, end-to-end encryption will soon be available for the majority of

Read more

Android puzzle game with over one million downloads reveals user information

Fruits Mania, a well-known and trustworthy puzzle game, is one of the thousands of apps on the Google Play store

Read more

LastPass Suffers 2nd Security Breach Of The Year; Exposing Some Customer’s Information

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

Popular password-management firm LastPass announced that it is looking into a second security issue in which hackers gained access to

Read more