Information Security
QR codes are kind of cool. But they're also vulnerable to a pretty nasty online attack, called QRLjacking. In this post we look at what QRLjacking is and how you can avoid it.
By Marc Dahan in Information Security on December 27, 2023
Online attacks are extremely prevalent and can do a lot of damage. In this article, we focus on CORS attacks, how they work and what you can do to avoid them.
By Marc Dahan in Information Security on September 22, 2023
Millions of VPN users could be at risk following the exposure of account info and connection logs on an unprotected server.
By Paul Bischoff in Information Security on November 3, 2021
You may have heard of Man in the Middle attacks. One subtype of this attack is called a Man in the Browser attack (MitB). We look at what MitB attacks are and what you can do to prevent them.
By Marc Dahan in Information Security on November 5, 2021
Individuals and businesses in Spain have to keep their wits about them when it comes to cyber security. Find out about the latest cyber crime and Spanish cyber security statistics.
By Aimee O'Driscoll in Information Security on July 28, 2022
Illicit hackers can be hired to break into social media accounts, erase debts, and even change students' grades, according to a Comparitech analysis of hacking services offered on the dark web.
By Paul Bischoff in Information Security on August 11, 2023
We analyzed ransomware's impact on the share prices of stock market-listed companies that suffered successful attacks.
By Paul Bischoff in Information Security on April 25, 2024
BadUSB disguises itself as a human interface device and covertly executes malicious commands or opens virus payloads on the target computer. Learn how you can prevent them.
By John Cirelly in Information Security on January 10, 2023
Page 13 of 47