Information Security
Hacking incidents are on the rise. Most go undetected long before the victim realizes what happened. Here are 10 clear signs you can use to tell if your phone or computer has been hacked.
By Amakiri Welekwe in Information Security on December 13, 2023
Health officials in Argentina exposed a database on the web containing personal information from people who applied for COVID-19 circulation permits, which exempt recipients from quarantine restrictions.
By Paul Bischoff in Information Security on July 30, 2020
Done with Twitter and want to get rid of your account as quickly as possible? We reveal how to quickly delete your Twitter profile and ensure your data is permanently wiped.
By Aimee O'Driscoll in Information Security on August 10, 2023
Advanced persistent threats (APTs) are the most complex cyberattacks. They are generally mounted by groups linked to nation-states and target highly valuable systems and data. We explain what APTs are and how to defend against them.
By Josh Lake in Information Security on January 5, 2024
We put a MongoDB honeypot on the web for three months to see who would attempt to view, steal, and destroy exposed data.
By Paul Bischoff in Information Security on March 15, 2022
Ever wondered who is more likely to be targeted by online scammers? We reveal some surprising internet safety statistics as well as easy to follow advice to protect yourself from online scams.
By Aimee O'Driscoll in Information Security on July 21, 2020
The domain name system is complex, which leaves it open to a range of DNS attacks. Find out what the different types of DNS attacks are and how to defend against them.
By Josh Lake in Information Security on October 30, 2023
If you think leaving user data exposed online for "just a day" is no big deal, think again.
By Paul Bischoff in Information Security on March 16, 2022
Worried you may be at risk to pharming attacks? We explain what pharming is, the difference between pharming and phishing, plus how to keep your computer safe.
By Aimee O'Driscoll in Information Security on December 8, 2023
Page 29 of 51