Information Security
If a preimage attack is possible against the cryptographic hash functions we use, it could completely undermine our online security.
By Josh Lake in Information Security on October 27, 2023
Websites and apps use dark patterns to manipulate us into taking actions that we may not want to take. Find out how they violate our privacy.
By Josh Lake in Information Security on June 14, 2022
In this detailed report, we have ranked 50 countries based on their child data protection legislation. Find out where your country stands on online privacy for children below.
By Paul Bischoff in Information Security on November 7, 2023
Border privacy examined: Discover how countries rank in the use, storage, and sharing of traveler da
By Paul Bischoff in Information Security on July 18, 2023
There’s no denying COVID changed the way we work. But did it have an impact on the number of cybersecurity threats during the pandemic? Take a look at the latest trends, facts and statistics to find out.
By Aimee O'Driscoll in Information Security on January 19, 2024
Learn about cybercrime in Italy. Explore the latest cybercrime and cybersecurity statistics and trends - with detailed information about how Italy is coping with cyberattacks.
By Ray Walsh in Information Security on February 26, 2024
Juice jacking attacks can lead to theft of your personal information and to malware infections. This post looks at what juice jacking is and how to avoid it happening to you. 
By Marc Dahan in Information Security on September 27, 2023
When using a Macbook, iPhone, or iPad, you may prefer a web browser other than the built-in Safari. If so, we’ll help you delete or disable Safari - simply follow this guide.
By Kyle Schurman in Information Security on December 14, 2023
Page 8 of 48