
The TT Protocol
“ Down in the Dumps…”
Is it just me or did your mum also tell you to eat the receipt that came out of the ATM? Ahhh, just me? Damn. I really exposed my Mum for no reason. You can’t leave that information just anywhere. You really have to stay ahead of the bad guys. Hands up if you rip…
“ Hi Jack… ”
Before I chat your ears off, can you quickly go and subscribe to my page? I’m really trying to make this blog grow! Have you ever heard of a hi-jack within a hi-jack? Well, this new exploit is called account pre-hijacking. It sounds funky, but Cyber T is going to elucidate this topic for your…
Follow My Blog
Get new content delivered directly to your inbox.
“ It’s only my third day out here… ”
Yes people, hope you’re all doing good. It’s been a while since my last blog and I wasn’t meant to take this long of a break, but hey ho, we’re here now. Anyway, I have some exciting news for you all *drum roll*… I got a new job (don’t all celebrate at once)! I have…
“ Always here when you call… ”
The final piece of the triad is Availability. I know it’s been quite a lot to get through, so thanks for sticking with me through all of this. Availability is pretty self-explanatory, it means that data, services or systems need to be available to users whenever they need them. I’ve worked on projects where I’ve…
” I got my I on you…”
Find me one start-up company that doesn’t have integrity as one of their company values. It’s a good quality to have and it’s very vital in the world of information security. In the last blog we looked at the ‘C’ in the CIA triad and how it’s implemented. Let’s now take a look at the…