Information Security
Clickjacking or UI redress attacks are extremely prevalent today. In this post we look at what clickjacking is, how it works, and how you can protect yourself.
By Marc Dahan in Information Security on January 24, 2024
Cross-site scripting (XSS) is an extremely common kind of online attack that targets web applications and websites. In this article, we look at what XSS attacks are, how they work, and how you can prevent them.
By Marc Dahan in Information Security on December 14, 2020
Considering pursuing a cyber security degree? We reveal the top online programs and explain how to choose the right fit for you.
By Aimee O'Driscoll in Information Security on April 25, 2023
Considering a role as a computer forensics analyst? We reveal everything you need to know about what this role entails and how to get started in your career.
By Aimee O'Driscoll in Information Security on April 14, 2022
Trojan Horses are one of the most successful malware attacks. In this post we look at what Trojan Horse malware is, what it does and how you can avoid it.
By Marc Dahan in Blog on February 1, 2024
In this review, we’ll dive into the different types of problems Graylog can solve, as well as the two different types of log management products Graylog offers to its customers.
By John Cirelly in Information Security on January 2, 2024
Cybersecurity job growth is exploding so if you've always wanted to work in cybersecurity, now is the time to start looking. Explore the market, learn who's hiring, and determine the path you need to land your first cybersecurity job.
By Sam Cook in Blog on March 25, 2021
Comparitech researchers have uncovered five critical cybersecurity flaws in Western Digital network-attached storage (NAS) devices. The vulnerabilities found affect tens of thousands of Western Digital My Cloud NAS devices globally.
By Paul Bischoff in Information Security on March 15, 2022
The Venona files provide a rare glimpse into the world of high stakes spycraft. In this post, we discuss some key elements that enabled the Americans to break the Soviet code.
By Marc Dahan in Information Security on November 12, 2020
Page 22 of 47