Information Security News, Guides & Expert Analysis

Our information security category covers everything you need to keep your data and personal information private. Our experts cover AI, scams, hacking, the safety of popular apps and websites, and more.

Metadata attached to images can pose a risk to your privacy and security. Find out how to remove photo metadata on Windows, MacOS, iOS and Android devices.
By Aimee O'Driscoll in Information Security on August 9, 2023
The cybersecurity industry has seen rapid growth in 2020, paving the way for a number of successful startups. Find out which cybersecurity companies are the ones to watch in 2025.
By Aimee O'Driscoll in Information Security on March 11, 2025
Clickjacking or UI redress attacks are extremely prevalent today. In this post we look at what clickjacking is, how it works, and how you can protect yourself.
By Marc Dahan in Information Security on January 24, 2024
Cross-site scripting (XSS) is an extremely common kind of online attack that targets web applications and websites. In this article, we look at what XSS attacks are, how they work, and how you can prevent them.
By Marc Dahan in Information Security on December 14, 2020
Trojan Horses are one of the most successful malware attacks. In this post we look at what Trojan Horse malware is, what it does and how you can avoid it.
By Marc Dahan in Blog on February 1, 2024
In this review, we’ll dive into the different types of problems Graylog can solve, as well as the two different types of log management products Graylog offers to its customers.
By John Cirelly in Information Security on February 14, 2025
Comparitech researchers have uncovered five critical cybersecurity flaws in Western Digital network-attached storage (NAS) devices. The vulnerabilities found affect tens of thousands of Western Digital My Cloud NAS devices globally.
By Paul Bischoff in Information Security on March 15, 2022
Plausible deniability seems like the ultimate get-out-of-jail-free card. But does it really work when it comes to encryption?
By Josh Lake in Information Security on January 8, 2024
The latest attempt by the U.S. government to undermine encryption is a piece of legislation called the EARN IT act. In this post, we break it down and discuss how it could affect privacy, free speech and encryption.
By Marc Dahan in Blog on November 10, 2021
Page 24 of 42