Information Security
Reverse tabnabbing is a common online attack that can compromise your online accounts. Thankfully, it's not hard to protect against it. We show you how in this post.
By Marc Dahan in Information Security on April 23, 2021
Finding trustworthy apps can be a tricky task at the best of times, and when it comes to your privacy, you simply can’t afford to choose poorly. That’s why we’ve tested numerous Android app lockers and brought you only the best.
By Ian Garland in Information Security on September 15, 2023
Many popular Android apps contain hardcoded credentials that can be found and abused by attackers against users, app developers, and APIs.
By Paul Bischoff in Information Security on March 15, 2022
Side-channel attacks don't target cryptographic systems, but their implementations instead. Find out how they can compromise secure algorithms.
By Josh Lake in Information Security on August 4, 2023
There are many different options for pursuing a career in cyber security. In this guide, we outline the most common types of cyber security roles, so you can get a sense of which one will best fit your interests and goals.
By Sam Woolfe in Information Security on April 13, 2021
Comparitech researchers found one in 50 Android apps requests unnecessary permissions to access private user data and take potentially dangerous actions.
By Paul Bischoff in Information Security on June 7, 2022
Businesses continue to face an increasing range of sophisticated cyber threats. Find out about the trends we’re observing in 2021 and beyond and how to protect your business against the most serious cyber hazards.
By Aimee O'Driscoll in Information Security on August 4, 2023
Interested in becoming a data protection officer? We reveal the typical job description, how to get hired, salary expectations, and the top companies that are hiring data protection officers.
By Sam Woolfe in Information Security on April 8, 2021
Do you want to study cyber security but not sure what type of degree to obtain? In this guide, we reveal all the different cyber security degrees, the jobs that each can lead to, and the salary you can expect to earn after graduating.
By Sam Woolfe in Information Security on April 8, 2021
Page 21 of 51