Information Security
Protecting customer PII is complicated for small businesses, but data breaches are much worse. Find out what PII is and how to keep it safe.
By Josh Lake in Information Security on March 15, 2022
Common misconfigurations on Google Firebase databases allow unauthorized parties to easily find and access users' personal data in thousands of apps.
By Paul Bischoff in Information Security on May 30, 2021
Worried about the safety of Zoom? With so many people using Zoom meetings for work it's important to know how to keep your sensitive data safe. We explain the essential steps you can take to keep your Zoom meetings private and secure.
By Amakiri Welekwe in Information Security on March 15, 2022
1.1 million customer records including some payment details were exposed by high-end gamepad manufacturer SCUF Gaming.
By Paul Bischoff in Information Security on April 11, 2020
Adware can be annoying, while ad-supported software can be a beneficial funding model. Find out how they relate to each other and how to remove any adware.
By Josh Lake in Information Security on December 11, 2023
42 million user IDs and phone numbers for a third-party version of Telegram were exposed online without a password. The accounts belong to users in Iran, where the official Telegram app is blocked.
By Paul Bischoff in Information Security on March 30, 2020
The COVID-19 outbreak has prompted a number of online schemes. Find out about coronavirus scams and how to avoid them.
By Aimee O'Driscoll in Information Security on December 2, 2021
Cryptojacking sprang up suddenly in late 2017. Not sure what cryptojacking is? We explain everything you need to know about this online practice along with how to detect cryptojacking.
By Josh Lake in Information Security on March 11, 2020
A third-party app used by EU merchants on Amazon UK, PayPal, and Shopify exposed 8 million sales records containing customers' personal data.
By Paul Bischoff in Information Security on March 27, 2020
Page 28 of 48