Information Security
Shopping for firewall hardware and confused by the options? We reveal our top picks for the best firewall hardware for small businesses.
By Aimee O'Driscoll in Information Security on January 18, 2021
Names, emails, and phone numbers of 2.7 million Friendemic consumers in the US were exposed on a publicly accessible database without a password.
By Paul Bischoff in Information Security on March 15, 2022
We set up a honeypot by publishing AWS credentials in public GitHub repositories to find out how attackers find and abuse them.
By Paul Bischoff in Information Security on July 10, 2022
Gym and fitness club chain Town Sports left 600,000 customers' data unprotected on the web, researchers report.
By Paul Bischoff in Information Security on March 15, 2022
131 of 2,064 scanned Google Cloud buckets were vulnerable to unauthorized access by users who could list, download, and/or upload files.
By Paul Bischoff in Information Security on March 15, 2022
Formjacking is used by cybercriminals to take over a website’s form page and steal user information. Find out more about this practice could affect you and how to prevent it.
By Aimee O'Driscoll in Information Security on August 4, 2023
Looking to improve your online security? Find out about the best cyber security awareness courses to help you and your employees stay safe online.
By Aimee O'Driscoll in Information Security on December 7, 2023
Comparitech researchers analyzed the underground mass hacking and website defacement market and uncovered 89 zero-day vulnerabilities affecting more than 100,000 sites.
By Paul Bischoff in Information Security on September 8, 2020
Global Tel Link-owned Telmate, which makes an app for prisoners to send messages and make calls to their friends and family, exposed a database of private messages and personal information on the web without a password.
By Paul Bischoff in Information Security on September 4, 2020
Page 25 of 48