Marc is a technology journalist with over 15 years experience. He specializes in content related to emerging technologies, cybersecurity, big data, privacy, artificial intelligence, and the politics of technology.
He has worked for some of the largest tech companies (Deluxe Digital, Sony, Autodesk) and is passionate about online privacy and digital freedom.
It's time to face the fact that the Internet is not as warm and fuzzy as we once made it out to be - it's pretty hostile. This post goes over the most common web-based attacks and avoiding them.
Credential dumping attacks are a type of credential-based attacks and they can be difficult to detect. This post looks at how credential dumping works and what you can do about it.
Web browsers enable us to access all kinds of content. Because of that, they're a tempting target for hackers. We look at the top six web browser vulnerabilities and what you can do to avoid them.
Mobile devices are ubiquitous today - and so are the vulnerabilities they can harbour. This post looks at the most common mobile code vulnerabilities and how to mitigate them.
OpenVPN is one of the most widely-used VPN protocols available. In this post, we look at the protocol, in-depth, to expose how it works and whether it's safe to use.
Javascript sniffing attacks have been used to compromise some of the internet's biggest sites. In this post, we look at what Javascript sniffing attacks are and how you can prevent them.
Full path disclosure attacks can be difficult to detect and have serious consequences for your organization. We explain what full path disclosure attacks are and how to defend against them.
There's a lot you can do with pfSense. It's a very powerful firewall/router. In this post, we look at how to set up your own OpenVPN server in pfSense.