Information Security
The domain name system is complex, which leaves it open to a range of DNS attacks. Find out what the different types of DNS attacks are and how to defend against them.
By Josh Lake in Information Security on October 30, 2023
If you think leaving user data exposed online for "just a day" is no big deal, think again.
By Paul Bischoff in Information Security on March 16, 2022
Worried you may be at risk to pharming attacks? We explain what pharming is, the difference between pharming and phishing, plus how to keep your computer safe.
By Aimee O'Driscoll in Information Security on December 8, 2023
A 5.0GB database belonging to the French Civic Service exposed nearly 1.4 million records on the web without a password or any authentication required to access it, Comparitech researchers report. The Agence du Service Civique recruits 19–25-year-olds for volunteer work.
By Paul Bischoff in Information Security on March 15, 2022
Although many restaurants' user accounts are available on dark web marketplaces, few have sold as widely as Domino's Pizza accounts. We explain how accounts have been hacked and how you can secure your account in the future.
By Sam Cook in Information Security on May 18, 2020
Protecting customer PII is complicated for small businesses, but data breaches are much worse. Find out what PII is and how to keep it safe.
By Josh Lake in Information Security on March 15, 2022
Common misconfigurations on Google Firebase databases allow unauthorized parties to easily find and access users' personal data in thousands of apps.
By Paul Bischoff in Information Security on May 30, 2021
Worried about the safety of Zoom? With so many people using Zoom meetings for work it's important to know how to keep your sensitive data safe. We explain the essential steps you can take to keep your Zoom meetings private and secure.
By Amakiri Welekwe in Information Security on March 15, 2022
1.1 million customer records including some payment details were exposed by high-end gamepad manufacturer SCUF Gaming.
By Paul Bischoff in Information Security on April 11, 2020
Page 26 of 47