68 percent of secondhand USB flash drives sold in the US, and 67 percent sold in the UK, still contain recoverable data from their previous owners, according to a new study by the University of Hertfordshire and commissioned by Comparitech.
By Paul Bischoff
in Information Security
on March 13, 2019
We explain what virus hoaxes are, how they work and how you can recognize them. We'll also give you
By Penny Hoelscher
in Antivirus
on August 18, 2020
How long should a hard drive last? That depends on factory defects, vibration, utilization, heat, an
By Paul Bischoff
in Cloud and Online Backup
on August 27, 2017
Host-based Intrusion Detection Systems operate on the log files that your server gathers from the network. Find out how to protect your data with a HIDS tool.
By Stephen Cooper
in Net Admin
on June 17, 2024
Since launching, OneVPN has worked to fill in the gaps of its VPN repetoire and sand off its rough e
By Paul Bischoff
in VPN
on July 29, 2022
WastedLocker attacks in a wave, released around the world, hitting significant corporations. However, it can be stopped.
By Stephen Cooper
in Net Admin
on December 23, 2024
In this article, we’ll be looking at how to wipe and secure external hard drives. Read on to find out more about why you might need to wipe your device and how to do it.
By Penny Hoelscher
in Information Security
on February 17, 2022
Tcpdump is a great tool for inspecting network traffic. Learn its key commands and see how to put it to use.
By Stephen Cooper
in Net Admin
on December 24, 2024
By Paul Bischoff
in News
on April 19, 2024