Information Security
With the rapid growth of the IoT more and more of our data can be accessed through connected devices
By Richard Patterson in Information Security on March 27, 2017
Interested in hardening your databases against SQL injection? We explain five key ways to prevent these attacks (with code samples) and help mitigate the damage if you do experience a breach.
By Dave Albaugh in Information Security on October 14, 2020
Businesses might be advertising on fake news sites without realizing it. Learn how to stop the sprea
By Paul Bischoff in Information Security on March 15, 2022
Looking to freeze your SSN or see if it's being used without your knowledge? We'll explain how, as well as what to do if someone has your social security number.
By Sam Cook in Information Security on August 25, 2023
Are you filled with uncertainty before downloading software? We’ll tell you how to judge whether a site is safe to download from and how to spot those that might put you at risk.
By Sam Cook in Information Security on October 20, 2023
What is DRM? Why is it used? Is DRM good or bad? Real examples of hardware and software DRM. Blockch
By Paul Bischoff in Information Security on March 18, 2017
If you find yourself making a large number of online payments, you may want to consider these helpfu
By Sam Cook in Information Security on March 19, 2017
Browser hijacking is a type of malware that takes over your browser to make it do things you do not
By Jon Watson in Information Security on March 18, 2017
How serious is WhatsApp's end-to-end encryption "backdoor"? What alternatives are out there? How to
By Paul Bischoff in Information Security on July 27, 2017
Page 46 of 49