Information Security
The unique properties of encryption, hashing and salting are vital for keeping our online world secure. In this article, we'll look at each of them in depth in order to understand what these processes are and how they are used.
By Josh Lake in Information Security on January 24, 2024
You entrust multiple organizations with your personal data every day, but given the number of data breaches that are reported each year, the odds are that your information has fallen into the wrong hands at some point. We reveal the biggest data breaches in history.
By Dave Albaugh in Data Breaches Studies on July 18, 2022
Comparitech's security research team is disclosing a stored XSS vulnerability in the popular WordPre
By Aaron Phillips in Information Security on January 19, 2023
Comparitech breaks down the concepts behind encryption, explaining the most common algorithms, security protocols and their uses.
By Josh Lake in Information Security on September 29, 2023
Interested in learning more about RSA encryption? We explain how RSA encryption was developed, how it works and the biggest security issues involved.
By Josh Lake in Information Security on March 5, 2024
Phishing scams are common place, here's how to recognize and avoid them.
By Dave Albaugh in Information Security on May 13, 2022
Pretty Good Privacy (PGP) is an encryption program that provides a free way to secure online communications. Find out how to use it in our step-by-step guide.
By Josh Lake in Information Security on November 16, 2023
Are you looking for a full disk encryption tool you can trust for Mac or Windows? We recommend six disk encryption tools.
By Paul Bischoff in Information Security on October 2, 2023
A new UK TV licensing scam targets British TV owners with phishing emails that threaten to terminate
By Paul Bischoff in Information Security on March 15, 2022
Page 37 of 48