Information Security
Facial recognition is now mainstream. There’s a new battle is between privacy and surveillance, an
By Victoria McIntosh in Information Security on October 22, 2020
The development of AI techniques has seen Artificial Intelligence (AI) start to appear in a lot of different IT products, including in the field of cybersecurity. Read about the leading cybersecurity companies spearheading AI initiatives.
By Stephen Cooper in Information Security on April 1, 2024
Want to donate to charities online but are worried about the plethora of scams out there? We explain the types of charity fraud and hoaxes to watch out for and provide tips for donating safely and securely.
By Aimee O'Driscoll in Information Security on February 25, 2019
Everything you need to know about the TLS protocol. This article covers what it is, how it works, its many different uses as well as its security problems.
By Josh Lake in Information Security on September 14, 2023
A stolen phone can leave you feeling helpless and scrambling. We explain the best course of action to take and what you can do to prepare for these types of situations.
By Aimee O'Driscoll in Information Security on August 18, 2023
Learn everything you need to know about IPsec. Find out about its different protocols, modes, uses, as well as its known security issues.
By Josh Lake in Information Security on December 15, 2023
Phone spam and scams are on the rise, with no signs of stopping. Between 2017 and 2024, spam calls rose exponentially in some categories. Here are the top statistics which reflect the growing, troubling trend with phone spam and scams.
By Craig McCart in Information Security on January 17, 2024
Sextortion is a form of blackmail. It can be particularly damaging for young people, who may be coerced into sharing material that’s subsequently used to threaten them. 
By Aimee O'Driscoll in Information Security on November 14, 2023
Learn what a relay attack is, how it works, and how it can be prevented. By way of illustration, we will look at three examples of relay attacks. Car relay attacks, particularly, show the varied techniques criminals use to get into, and away with, your car.
By Penny Hoelscher in Information Security on August 3, 2023
Page 34 of 47