Information Security
Most of us like technology and where it takes us. But can it go too far? In this post, we discuss digital passports and some of their potential consequences.
By Marc Dahan in Information Security on May 20, 2021
The Biden administration is taking steps to help secure US critical infrastructure and supply chains. Will it be enough to prevent another attack?
By Paul Bischoff in Information Security on May 17, 2021
Will Biden follow through on Trump's decision to ban TikTok? We explore the Biden administration's next moves regarding the Chinese-owned social media app.
By Paul Bischoff in Information Security on June 10, 2021
Cyber crime in France is following a similar trajectory to other European countries. Read on to discover the latest France cyber security and cyber crime statistics.
By Aimee O'Driscoll in Information Security on August 14, 2022
Cross-site request forgeries are complex attacks that exploit predictable request parameters. They lead to state changes that can cause significant harm to victims.
By Josh Lake in Information Security on May 14, 2021
Ransomware as a Service (RaaS) has become an increasingly popular tool among cyber criminals. We reveal what RaaS is and how you can avoid falling victim to it.
By Aimee O'Driscoll in Information Security on January 17, 2024
WannaCry is probably the most infamous strain of ransomware in the world, but there’s a real lack of understanding as to what it is, how it managed to compromise so many machines, and the scale of the impact it had just a few years ago. Today, we explore the history of WannaCry and explain how to prevent it from infecting your system with one easy step. 
By Ian Garland in Information Security on January 25, 2024
Remote code execution attacks can be quite nasty. In this article, we explain how RCE attacks work and what you can to to protect against them.
By Marc Dahan in Information Security on March 10, 2022
Session hijacking can leave you locked-out of your critical accounts. Read on to learn what session hijacking attacks are and what can be done to avoid them.
By Marc Dahan in Information Security on December 22, 2023
Page 17 of 48