Information Security
Thinking of pursuing a career as a penetration tester? We reveal what becoming a penentration tester involves, predicted salaries and what you need to do to get started.
By Sam Woolfe in Information Security on November 14, 2023
If you are interested in continuing your studies in cyber security, you will want to know if it's worth it. In this article, we highlight the top schools offering courses, the cost of a degree, how to choose a course, and the benefits of gaining a Master's qualification.
By Sam Woolfe in Information Security on April 13, 2022
Metadata attached to images can pose a risk to your privacy and security. Find out how to remove photo metadata on Windows, MacOS, iOS and Android devices.
By Aimee O'Driscoll in Information Security on August 9, 2023
The cybersecurity industry has seen rapid growth in 2020, paving the way for a number of successful startups. Find out which cybersecurity companies are the ones to watch in 2021.
By Aimee O'Driscoll in Information Security on January 6, 2021
Clickjacking or UI redress attacks are extremely prevalent today. In this post we look at what clickjacking is, how it works, and how you can protect yourself.
By Marc Dahan in Information Security on January 24, 2024
Cross-site scripting (XSS) is an extremely common kind of online attack that targets web applications and websites. In this article, we look at what XSS attacks are, how they work, and how you can prevent them.
By Marc Dahan in Information Security on December 14, 2020
Considering pursuing a cyber security degree? We reveal the top online programs and explain how to choose the right fit for you.
By Aimee O'Driscoll in Information Security on April 25, 2023
Considering a role as a computer forensics analyst? We reveal everything you need to know about what this role entails and how to get started in your career.
By Aimee O'Driscoll in Information Security on April 14, 2022
Trojan Horses are one of the most successful malware attacks. In this post we look at what Trojan Horse malware is, what it does and how you can avoid it.
By Marc Dahan in Blog on February 1, 2024
Page 23 of 48