Information Security
DuckDuckGo makes a search engine, browser extension, and mobile browser that combine to give you high levels of privacy while you use the internet. Find out how DuckDuckGo works in this guide.
By Kyle Schurman in Information Security on September 14, 2023
UK government cyber siege: Each employee faces 2,246 malicious emails annually, highlighting the rel
By Paul Bischoff in Cybercrime Studies on April 18, 2023
Deactivating Snapchat is not difficult, but it does require following precise steps. We will explain how the process of deactivating Snapchat works and exactly what happens to your content.
By Kyle Schurman in Information Security on August 9, 2023
Although deleting your Amazon account is a straightforward process, you do have to follow the required steps precisely, or your account may remain active.
By Kyle Schurman in Information Security on January 24, 2024
Collision attacks threaten the security of cryptographic hash functions, which form critical parts of our cybersecurity infrastructure. This article covers everything you should know about collision attacks.
By Josh Lake in Information Security on September 13, 2023
With cyberattacks becoming more sophisticated year on year, ensuring the correct implementation of encryption is more paramount than ever. Check out 15 of the most eye-opening encryption statistics.
By Craig McCart in Information Security on March 29, 2022
Malvertising, a form of malware injected into web and app advertisements is on the rise. Join us as we deep dive into some of the most recent malvertising trends, how malvertising works, and more.
By Craig McCart in Information Security on February 8, 2024
It's time to face the fact that the Internet is not as warm and fuzzy as we once made it out to be - it's pretty hostile. This post goes over the most common web-based attacks and avoiding them.
By Marc Dahan in Information Security on November 10, 2023
Credential dumping attacks are a type of credential-based attacks and they can be difficult to detect. This post looks at how credential dumping works and what you can do about it.
By Marc Dahan in Information Security on September 22, 2023
Page 8 of 47