Information Security
Tech support scams are on the decline, but they're still a major problem in different parts of the world. Here's everything you need to know about how a tech support scam works, including real examples of what these scams look like from the inside.
By Dave Albaugh in Information Security on July 3, 2019
Children are particularly susceptible to identity theft. They spend more time online than adults and have fewer ways of finding out when their personal information has been taken. Find out what you can do to keep them safe.
By Paul Bischoff in Identity Theft Protection on January 18, 2024
The "anti-encryption laws" are a significant piece of legislation that could have worldwide security ramifications. Find out what they are and who they will affect in this comprehensive guide.
By Josh Lake in Information Security on May 29, 2019
Exploit kits are a silent threat that cybercriminals use to spread malware by attacking system weaknesses. Find out about exploits kits and how they’re used.
By Aimee O'Driscoll in Information Security on July 2, 2020
Electronic and internet voting can help improve our election systems in several different ways. Each of these concepts rely on cryptography for security - but is cryptography enough?
By Josh Lake in Information Security on August 14, 2020
Looking to secure your company’s digital assets or considering a career in cybersecurity? We reveal the best online cybersecurity courses for beginners to help get you started.
By Aimee O'Driscoll in Information Security on December 7, 2023
If you’re looking to get into ethical hacking, getting acquainted with Python is a great start. We discuss Python and ethical hacking and reveal the best online courses you can take to start training in the field.
By Aimee O'Driscoll in Information Security on December 7, 2023
Becoming a Certified Ethical Hacker (CEH) can be a smart career move and can be incredibly lucrative. Find out how to learn ethical hacking and the best online courses available.
By Penny Hoelscher in Information Security on January 8, 2024
Cybersecurity for your business can be very expensive. We look at easy-to-implement tools and best practices that won’t take too much from the bottom line.
By Aimee O'Driscoll in Information Security on September 16, 2022
Page 33 of 48