Information Security
Cross-site request forgeries are complex attacks that exploit predictable request parameters. They lead to state changes that can cause significant harm to victims.
By Josh Lake in Information Security on May 14, 2021
Ransomware as a Service (RaaS) has become an increasingly popular tool among cyber criminals. We reveal what RaaS is and how you can avoid falling victim to it.
By Aimee O'Driscoll in Information Security on January 17, 2024
WannaCry is probably the most infamous strain of ransomware in the world, but there’s a real lack of understanding as to what it is, how it managed to compromise so many machines, and the scale of the impact it had just a few years ago. Today, we explore the history of WannaCry and explain how to prevent it from infecting your system with one easy step. 
By Ian Garland in Information Security on January 25, 2024
Remote code execution attacks can be quite nasty. In this article, we explain how RCE attacks work and what you can to to protect against them.
By Marc Dahan in Information Security on March 10, 2022
Session hijacking can leave you locked-out of your critical accounts. Read on to learn what session hijacking attacks are and what can be done to avoid them.
By Marc Dahan in Information Security on December 22, 2023
Comparitech researchers accessed an unsecured Facebook bot farm used to control nearly 14,000 fake accounts. Here’s what we found.
By Paul Bischoff in Information Security on March 15, 2022
Travelers whose data was exposed could be at risk of identity theft, phishing, and other attacks. In some cases, national ID numbers and Social Security numbers were leaked.
By Paul Bischoff in Information Security on May 6, 2021
If you receive a message from someone who claims to own images on your site and threatens legal action, don't click the link! It might well be a phishing scam.
By Paul Bischoff in Information Security on September 12, 2023
A recent Comparitech study found that while some organizations respond promptly to data breach disclosures, most don’t acknowledge such alerts at all.
By Aimee O'Driscoll in Data Breaches Studies on January 21, 2022
Page 16 of 47