Tel: +44 (0) 330 380 1094

August 17, 2012

No Comments

The Importance of Updates

The recent news that the Reuters News Agency’s blog has been compromised for the third time in a month has got me wondering exactly what process the administrators went through after the first attack.

August 15, 2012

No Comments

Protect Your Source Code: Part 1

I recently spent the weekend in Brighton, at the first PC and Indie Games Conference, Rezzed. During the weekend, I went to various developer sessions where games developers talked about the processes they used to develop their games, the next titles they were working on, or how their latest game was born.

August 9, 2012

No Comments

Setting Up Google 2-step Verification

The recent article in Wired Magazine (http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/) relating to a sophisticated attack against a specific individual that led to the closure of their GMail Account, compromise of their Twitter account, Amazon Account and Apple iCloud Service (which the attacker then used to wipe the data from the victim’s iPhone, iPad and Mac), highlights the need for strong multi-factor authentication.