Our information security category covers everything you need to keep your data and personal information private. Our experts cover AI, scams, hacking, the safety of popular apps and websites, and more.
Millions of anonymous messages and user records apparently from the secret sharing app Whisper were exposed online without a password. Again.
Watering hole attacks can be devastating to organizations - and they're quite common. In this post we explain what watering hole attacks are and how you can avoid them.
Cybersecurity risk management is the continuous process of identifying, analyzing, evaluating, and addressing an organization’s cyber security threats. Learn how to design and implement your security processes.
Exposed names, email addresses, and IP addresses could put millions of Stripchat users at risk.
Web cache poisoning attacks can put your web site/application at risk, as well as your users. In this post, we look at how web cache poisoning attacks work and what you can do to prevent them.
Cryptanalysis is a collection of techniques used to break encryption without obtaining the decryption key. What are these techniques? How do they work? And what can be done to protect against them?
QR codes are kind of cool. But they're also vulnerable to a pretty nasty online attack, called QRLjacking. In this post we look at what QRLjacking is and how you can avoid it.
Online attacks are extremely prevalent and can do a lot of damage. In this article, we focus on CORS attacks, how they work and what you can do to avoid them.
Millions of VPN users could be at risk following the exposure of account info and connection logs on an unprotected server.