Information Security
Most people who use the internet regularly have dozens of passwords to deal with. Find out some surprising password statistics, facts, and trends and learn how to handle your passwords.
By Aimee O'Driscoll in Information Security on March 24, 2023
There are major concerns about whether TikTok is a threat. Could it be used to censor information or spread propaganda? Is it dangerous?
By Josh Lake in Information Security on April 13, 2022
Many cyber attacks exploit buffer overflow vulnerabilities to compromise target applications or systems. Here's is what you need to know, and what you can do to secure your applications. 
By Amakiri Welekwe in Information Security on September 27, 2023
Social Data says it only takes public data from public profiles, but scraping is strictly against most social networks' terms of use.
By Paul Bischoff in Information Security on May 30, 2021
Immunity passports may seem like a natural fit at this time, but we have a duty to ensure that the underlying technology does not undermine our privacy rights and individual freedoms.
By Amakiri Welekwe in Information Security on August 14, 2020
Fraudsters often use emails, texts, phone calls, and pretexting scenarios to extract sensitive information. We reveal everything you need to know about pretexting attacks including examples and how to defend yourself.
By Amakiri Welekwe in Information Security on January 8, 2024
One of the key questions to ponder when using Google Drive cloud storage is: are my files secure and private? We take a closer look at Google Drive security, and offer steps you can take to improve it.
By Amakiri Welekwe in Information Security on September 21, 2023
Hacking incidents are on the rise. Most go undetected long before the victim realizes what happened. Here are 10 clear signs you can use to tell if your phone or computer has been hacked.
By Amakiri Welekwe in Information Security on December 13, 2023
Health officials in Argentina exposed a database on the web containing personal information from people who applied for COVID-19 circulation permits, which exempt recipients from quarantine restrictions.
By Paul Bischoff in Information Security on July 30, 2020
Page 26 of 48