Information Security
Illicit hackers can be hired to break into social media accounts, erase debts, and even change students' grades, according to a Comparitech analysis of hacking services offered on the dark web.
By Paul Bischoff in Information Security on August 11, 2023
We analyzed ransomware's impact on the share prices of stock market-listed companies that suffered successful attacks.
By Paul Bischoff in Information Security on April 25, 2024
BadUSB disguises itself as a human interface device and covertly executes malicious commands or opens virus payloads on the target computer. Learn how you can prevent them.
By John Cirelly in Information Security on January 10, 2023
An unsecured database containing international travel records dating back 10 years was left exposed on the web.
By Paul Bischoff in Information Security on September 20, 2021
Unpacking the $9.45bn impact of ransomware attacks on US schools and colleges: Explore the financial
By Paul Bischoff in Information Security on August 27, 2024
In this article, we discuss the underlying processes of the MD5 algorithm and how the math behind the MD5 hash function works.
By Josh Lake in Information Security on September 25, 2023
MD5 is a cryptographic hash function that is no longer considered safe for many purposes. Find out why and what to use instead.
By Josh Lake in Information Security on December 28, 2023
Most phone scams now utilize number spoofing techniques. We explore how number spoofing works and how to avoid these scams.
By Sam Cook in Information Security on August 9, 2023
Page 15 of 48