Information Security
With cyberattacks becoming more sophisticated year on year, ensuring the correct implementation of encryption is more paramount than ever. Check out 15 of the most eye-opening encryption statistics.
By Craig McCart in Information Security on March 29, 2022
Malvertising, a form of malware injected into web and app advertisements is on the rise. Join us as we deep dive into some of the most recent malvertising trends, how malvertising works, and more.
By Craig McCart in Information Security on February 8, 2024
It's time to face the fact that the Internet is not as warm and fuzzy as we once made it out to be - it's pretty hostile. This post goes over the most common web-based attacks and avoiding them.
By Marc Dahan in Information Security on November 10, 2023
Credential dumping attacks are a type of credential-based attacks and they can be difficult to detect. This post looks at how credential dumping works and what you can do about it.
By Marc Dahan in Information Security on September 22, 2023
Web browsers enable us to access all kinds of content. Because of that, they're a tempting target for hackers. We look at the top six web browser vulnerabilities and what you can do to avoid them.
By Marc Dahan in Information Security on October 19, 2023
Mobile devices are ubiquitous today - and so are the vulnerabilities they can harbour. This post looks at the most common mobile code vulnerabilities and how to mitigate them.
By Marc Dahan in Information Security on March 23, 2022
Botnets are a growing trend for cybercriminals to unleash a string of attacks on unsuspecting victims. We've collated some shocking statistics to understand the impact botnets have on the internet.
By Craig McCart in Information Security on October 31, 2022
Ever received a WhatsApp message from a friend asking for money? It could be a scam. Read our WhatsApp scam article to ensure you never let the fraudsters win.
By Craig McCart in Information Security on September 8, 2023
Page 13 of 51