Information Security
Looking to improve your online security? Find out about the best cyber security awareness courses to help you and your employees stay safe online.
By Aimee O'Driscoll in Information Security on December 7, 2023
Comparitech researchers analyzed the underground mass hacking and website defacement market and uncovered 89 zero-day vulnerabilities affecting more than 100,000 sites.
By Paul Bischoff in Information Security on September 8, 2020
Global Tel Link-owned Telmate, which makes an app for prisoners to send messages and make calls to their friends and family, exposed a database of private messages and personal information on the web without a password.
By Paul Bischoff in Information Security on September 4, 2020
Most people who use the internet regularly have dozens of passwords to deal with. Find out some surprising password statistics, facts, and trends and learn how to handle your passwords.
By Aimee O'Driscoll in Information Security on March 24, 2023
There are major concerns about whether TikTok is a threat. Could it be used to censor information or spread propaganda? Is it dangerous?
By Josh Lake in Information Security on April 13, 2022
Many cyber attacks exploit buffer overflow vulnerabilities to compromise target applications or systems. Here's is what you need to know, and what you can do to secure your applications. 
By Amakiri Welekwe in Information Security on September 27, 2023
Social Data says it only takes public data from public profiles, but scraping is strictly against most social networks' terms of use.
By Paul Bischoff in Information Security on May 30, 2021
Immunity passports may seem like a natural fit at this time, but we have a duty to ensure that the underlying technology does not undermine our privacy rights and individual freedoms.
By Amakiri Welekwe in Information Security on August 14, 2020
Fraudsters often use emails, texts, phone calls, and pretexting scenarios to extract sensitive information. We reveal everything you need to know about pretexting attacks including examples and how to defend yourself.
By Amakiri Welekwe in Information Security on January 8, 2024
Page 28 of 51