Cryptojacking sprang up suddenly in late 2017. Not sure what cryptojacking is? We explain everything you need to know about this online practice along with how to detect cryptojacking.
By Josh Lake
in Information Security
on March 11, 2020
Legal professionals have a particular interest in keeping information secure. We explain what you can do to ensure client data remains locked up tight.
By Aimee O'Driscoll
in Information Security
on August 9, 2022
Unfortunately, some iPhone users complain of receiving unsolicited AirDrops. In this guide, we’ll explain how to avoid getting unwanted AirDrops in a few easy steps.
By Ray Walsh
in VPN & Privacy
on June 22, 2024
WastedLocker attacks in a wave, released around the world, hitting significant corporations. However, it can be stopped.
By Stephen Cooper
in Net Admin
on December 23, 2024
Ticketmaster was far from the only cyber attack victim this week. Here's a roundup of the week's top ransomware news.
By Paul Bischoff
in News
on May 31, 2024
Car accident lawyer Michael T Gibson notified clients about a July 2024 data breach that compromised
By Paul Bischoff
in News
on August 26, 2024
Host-based Intrusion Detection Systems operate on the log files that your server gathers from the network. Find out how to protect your data with a HIDS tool.
By Stephen Cooper
in Net Admin
on June 17, 2024
Since launching, OneVPN has worked to fill in the gaps of its VPN repetoire and sand off its rough e
By Paul Bischoff
in VPN
on July 29, 2022
According to data collated by Comparitech researchers, almost 1 in 5 ransomware attacks led to a lawsuit in 2023. Over the past couple of years, lawsuits filed following ransomware attacks have increased, with the overall average over the last five years standing at 12 percent.
By Rebecca Moody
in Ransomware Studies
on May 1, 2024
Phishing is a nasty business that runs 24/7/365. During tax season, a special type of phishing attac
By Dave Albaugh
in Information Security
on December 2, 2019