Information Security News, Guides & Expert Analysis

Our information security category covers everything you need to keep your data and personal information private. Our experts cover AI, scams, hacking, the safety of popular apps and websites, and more.

Whaling is a devastating type of phishing attack, and unfortunately, it's becoming more common. Read on to learn everything you need to know about whaling and how to protect your business.
By Stephen Cooper in Information Security on August 25, 2023
Once your wifi access gets out into the world, it can be difficult to protect your home wireless network from intrusion. We explain simple changes you can make along with best practices to protect your home network from hackers.
By Stephen Cooper in Information Security on September 6, 2023
Spear phishing can be the cause of huge financial losses, both for individuals and businesses. We explain exactly what a spear phishing attack is (with examples) and the best practices to avoid becoming a victim.
By Aimee O'Driscoll in Information Security on October 19, 2020
Schooling costs money, even for those looking to get started in cybersecurity. But as the industry g
By Sam Cook in Information Security on April 16, 2022
A brute force attack is a method used to obtain private user data. In this post, we explore brute force attacks in detail, including some examples, and then reveal how you can protect against them.
By Aimee O'Driscoll in Information Security on December 22, 2023
If you're leaving active service and entering civilian life, you may be where to turn. Cyber securit
By Sam Cook in Information Security on April 26, 2018
Sandboxing is a way of isolating specific programs and apps. We’ll explore why it’s so useful and tell you to go about creating sandboxes of your own.
By Jon Watson in Information Security on April 2, 2024
Botnets are enslaved computers that hackers use to hide their identities when they launch attacks. T
By Stephen Cooper in Information Security on August 24, 2018
Page 37 of 42