Author Archives: DSW

October 27

Samsung Galaxy S20 Tactical Edition

If you have an interest in secure or ruggedised smartphones you may want to check out Samsung’s Galaxy S20 Tactical Edition (TE). Recognising the unique requirements of the battlefield Samsung has taken its conventional S20 handset and upgraded it into a Swiss army knife of features designed to aid the modern soldier. The baseline device […]

August 16

Operator Handbook

You’re sitting tapping commands into a laptop with your team sitting around you in a hastily arranged horseshoe of office chairs. They watch intently as you reveal a misconfiguration in one of your company servers that leaves it wide open to attack. It took hours of painstaking effort to find and you feel a sense […]

June 23

datAshur PRO2 Encrypted Flash Drive

Frantically patting down your pockets and wondering where you left the USB with your work saved on isn’t an experience anyone wants. But it could be worse if the data on said flash drive is unsecured and open for a complete stranger to explore. Encrypted flash drives aim to change this by letting you encrypt […]

March 01

HP Elite Dragonfly

  Cyber threats aren’t always easily avoidable without the benefit of hindsight, but realising you’ve been an easy target could make an attack all the more infuriating. For many of us, a good way to avoid becoming easy pickings for an attacker is selecting a device with in-built, easy to use security features. As the […]

November 16

FINNEY Secure Blockchain Smartphone

We’re always on the lookout for items of tech with strong security features that stand out from the crowd. In the smartphone arena the Sirin Labs FINNEY Secure Blockchain Smartphone ticks both boxes among hordes of generic rectangular clones. The FINNEY provides a general set of features that could be expected from any current flagship […]

October 11

LIFE 3.0

  Our reviews generally focus on products that will help enable or inform a secure lifestyle rather than more existential threats, but in the case of Life 3.0: Being human in the age of Artificial Intelligence, we made an exception. The potential implications of artificial intelligence (AI) for our future are simply too big too […]

August 10

BestCrypt Volume Encryption

It’s Friday evening and you’ve just got home from a long week of work bracketed by endless commutes. You collapse on the couch and reach for your laptop, opting for a bit of Netflix while you decide what to do with the rest of your night. ‘Wait a minute’ you think, ‘where is my laptop?’ […]

January 26

Zendure X6 Portable Charger

  In today’s device-driven world, running out of juice while on the go could range from being an inconvenience to downright risky, depending on your lifestyle. The thought of being caught out in a power cut or isolated out in the wilderness with a bag full of dead devices is enough to send a chill […]

November 05

BlackBerry KEY2

Smartphones have shot up the rankings of malware targets over the years – with a 2018 McAfee Mobile Threat Report estimating that total strains of mobile malware increased from around 7.5m in 2015 to a shade over 20m by Q3 2017. This isn’t surprising given that cyber criminals follow the money (or data) like any […]

July 25

Blue Team Field Manual

The maxim ‘use it or lose it’ applies as much to the array of operating system commands, scripting languages and toolset peculiarities as it does to the language classes many of us try to recall on vacation each year. If you forget your scan commands as quickly as your Spanish the Blue Team Field Manual […]