Information Security
DDoS attacks are on the rise, but hackers are also adapting their strategies to counteract growing mitigation techniques. Here's a review of the latest stats and trends highlighting DDoS attacks in 2018-2024.
By Sam Cook in Information Security on January 8, 2024
Cyber security in the United States has become an important topic as digital crime continues to ravage throughout the country. Find out about the latest statistics on US cyber security and cyber crime.
By Ray Walsh in Information Security on January 10, 2024
Like most injection attacks, LDAP injection can be nasty. This post looks at how these LDAP attacks are pulled off and how to avoid them.
By Marc Dahan in Information Security on June 19, 2022
Fernet makes it easy for Python developers to implement encryption and authentication into their applications.
By Josh Lake in Information Security on September 5, 2023
Server-side include (SSI) injection attacks aren't the most common online attack, but they can have disasterous consequences. This post looks at what SSI injection attacks are and provides tips on defending against them.
By Marc Dahan in Information Security on November 16, 2023
The CIA triad are three critical attributes for data security; confidentiality, integrity and availability.
By Josh Lake in Information Security on November 1, 2023
Single sign-on can make life easier for users and help to boost an organization's overall security. We reveal the pros and cons of single sign-on and whether you should use it.
By Josh Lake in Information Security on August 1, 2023
If a preimage attack is possible against the cryptographic hash functions we use, it could completely undermine our online security.
By Josh Lake in Information Security on October 27, 2023
Websites and apps use dark patterns to manipulate us into taking actions that we may not want to take. Find out how they violate our privacy.
By Josh Lake in Information Security on June 14, 2022
Page 6 of 47