Information Security
Electronic voting and internet voting seem like excellent ways to improve our election systems. But in reality, things aren't so straightforward.
By Josh Lake in Information Security on April 12, 2022
Account takeover fraud can be damaging for businesses and individuals alike. We explain more about this common crime and how to detect and prevent it.
By Aimee O'Driscoll in Information Security on January 18, 2021
A new and potentially dangerous phishing method utilizes weak security methods in website sign-up forms to easily bypass spam filters. These validation email phishing scams are hard to stop because they come directly from legitimate websites.
By Sam Cook in Blog on April 9, 2019
Legal professionals have a particular interest in keeping information secure. We explain what you can do to ensure client data remains locked up tight.
By Aimee O'Driscoll in Information Security on August 9, 2022
Digital signatures can be used to verify the identity of another party, check the integrity of data and provide non-repudiation. Find out how they work in our comprehensive guide.
By Josh Lake in Information Security on December 21, 2023
SSH is a security protocol used for remote login, tunneling and much more. Find out how it works, what it does and whether it is secure.
By Josh Lake in Information Security on November 22, 2023
UK readers, beware of this scam targeting BT Internet customers over the phone that cost one woman £34,000. Tech support scams like these often target the elderly and vulnerable, so be sure to warn your parents and grandparents.
By Paul Bischoff in Information Security on March 22, 2022
Quantum computing looks like it could revolutionize our technological world in the not too distant future. Find out what it is and how it may affect our security.
By Josh Lake in Information Security on August 2, 2023
Ransomware is a particularly invasive form of malware that typically takes over a victim’s data or device and holds it hostage until a sum of money is handed over to secure its release.
By Sam Cook in Information Security on March 7, 2024
Page 34 of 48