Information Security
Adware can be annoying, while ad-supported software can be a beneficial funding model. Find out how they relate to each other and how to remove any adware.
By Josh Lake in Information Security on December 11, 2023
42 million user IDs and phone numbers for a third-party version of Telegram were exposed online without a password. The accounts belong to users in Iran, where the official Telegram app is blocked.
By Paul Bischoff in Information Security on March 30, 2020
The COVID-19 outbreak has prompted a number of online schemes. Find out about coronavirus scams and how to avoid them.
By Aimee O'Driscoll in Information Security on December 2, 2021
Cryptojacking sprang up suddenly in late 2017. Not sure what cryptojacking is? We explain everything you need to know about this online practice along with how to detect cryptojacking.
By Josh Lake in Information Security on March 11, 2020
A third-party app used by EU merchants on Amazon UK, PayPal, and Shopify exposed 8 million sales records containing customers' personal data.
By Paul Bischoff in Information Security on March 27, 2020
Hosting a public event in the coming months? If you’re responsible for a networking mix or a big-name concert coming to town, pay attention. Here's the low-down on what to expect and how to handle privacy at events.
By Victoria McIntosh in Information Security on April 15, 2022
Huawei's involvement in 5G networks has gotten a host of media attention over the past few years, but most articles skate around the truth. Our deep dive tells you what's really going on.
By Josh Lake in Information Security on May 13, 2021
We've gathered data on ransomware attacks involving hospitals and healthcare organisations to unders
By Paul Bischoff in Information Security on October 23, 2023
5G is rolling out to considerable fanfare. Find out what it really means, how it will affect the technology landscape, and whether there are any security dangers.
By Josh Lake in Information Security on May 13, 2021
Page 27 of 47