Information Security
Think your trash is worthless? Think again! Hackers are diving into dumpsters to steal your identity. Learn how these attacks work and get expert tips to keep your sensitive data out of criminals' hands.
By Craig McCart in Information Security on November 11, 2024
Clicked a suspicious link? Learn exactly what to do after a phishing attack. Real cases, expert advice, and recovery actions from the FBI and CISA to protect your data and money.
By Craig McCart in Information Security on November 12, 2024
Is safe to use ChatGPT? There are many ethical and technical considerations for using ChatGPT safely. We take a close look at privacy risks and other factors that may affect your decision to use ChatGPT.
By Ray Walsh in Information Security on October 10, 2024
Electronic Health Records solve problems related to paper documents, but are there downsides? We explore the disadvantages of electronic health records and consider how they impact healthcare delivery.
By Ray Walsh in Information Security on May 15, 2024
Broswer hijacking can have serious consequences. In this post we provide an overview of browser hijacking attacks and explain how to protect against them.
By Marc Dahan in Information Security on July 25, 2024
Fake apps can cause serious problems. They allow cybercriminals to snoop on you and steal data. This guide explains how to spot and avoid fake apps.
By Ray Walsh in Information Security on April 5, 2024
Wondering if Signal is secure enough for you to use it? This post will help you decide. It provides an overview of Signal's security model and offers tips on using the app as securely as possible.
By Marc Dahan in Information Security on March 9, 2024
If you're wondering if Telegram is safe and secure, this post can help. In it, we provide an in-depth overview of Telegram's security and offer tips on using it as securely.
By Marc Dahan in Information Security on March 9, 2024
Page 1 of 47
1247