Clickjacking or UI redress attacks are extremely prevalent today. In this post we look at what clickjacking is, how it works, and how you can protect yourself.
Cross-site scripting (XSS) is an extremely common kind of online attack that targets web applications and websites. In this article, we look at what XSS attacks are, how they work, and how you can prevent them.
Considering a role as a computer forensics analyst? We reveal everything you need to know about what this role entails and how to get started in your career.
Trojan Horses are one of the most successful malware attacks. In this post we look at what Trojan Horse malware is, what it does and how you can avoid it.
In this review, we’ll dive into the different types of problems Graylog can solve, as well as the two different types of log management products Graylog offers to its customers.
Cybersecurity job growth is exploding so if you've always wanted to work in cybersecurity, now is the time to start looking. Explore the market, learn who's hiring, and determine the path you need to land your first cybersecurity job.
Comparitech researchers have uncovered five critical cybersecurity flaws in Western Digital network-attached storage (NAS) devices. The vulnerabilities found affect tens of thousands of Western Digital My Cloud NAS devices globally.
The Venona files provide a rare glimpse into the world of high stakes spycraft. In this post, we discuss some key elements that enabled the Americans to break the Soviet code.