Information Security
Like most injection attacks, LDAP injection can be nasty. This post looks at how these LDAP attacks are pulled off and how to avoid them.
By Marc Dahan in Information Security on June 19, 2022
Fernet makes it easy for Python developers to implement encryption and authentication into their applications.
By Josh Lake in Information Security on September 5, 2023
Server-side include (SSI) injection attacks aren't the most common online attack, but they can have disasterous consequences. This post looks at what SSI injection attacks are and provides tips on defending against them.
By Marc Dahan in Information Security on November 16, 2023
The CIA triad are three critical attributes for data security; confidentiality, integrity and availability.
By Josh Lake in Information Security on November 1, 2023
Single sign-on can make life easier for users and help to boost an organization's overall security. We reveal the pros and cons of single sign-on and whether you should use it.
By Josh Lake in Information Security on August 1, 2023
If a preimage attack is possible against the cryptographic hash functions we use, it could completely undermine our online security.
By Josh Lake in Information Security on October 27, 2023
Websites and apps use dark patterns to manipulate us into taking actions that we may not want to take. Find out how they violate our privacy.
By Josh Lake in Information Security on June 14, 2022
In this detailed report, we have ranked 50 countries based on their child data protection legislation. Find out where your country stands on online privacy for children below.
By Paul Bischoff in Information Security on November 7, 2023
Border privacy examined: Discover how countries rank in the use, storage, and sharing of traveler da
By Paul Bischoff in Information Security on July 18, 2023
Page 10 of 51