Employment applications can be a privacy nightmare. Thankfully, Employers must follow legal requirem
By Sam Cook
in Information Security
on April 15, 2022
It's 2019, and popup ads are still a problem! We've tested over two dozen popup ad blockers. These 12 ad blockers offer the best quality and are completely free to use.
By Sam Cook
in Information Security
on October 25, 2019
Huawei's involvement in 5G networks has gotten a host of media attention over the past few years, but most articles skate around the truth. Our deep dive tells you what's really going on.
By Josh Lake
in Information Security
on May 13, 2021
Employee monitoring isn't new but it is becoming more prevalent. Find out about rules surrounding wo
By Aimee O'Driscoll
in VPN & Privacy
on May 14, 2021
Collision attacks threaten the security of cryptographic hash functions, which form critical parts of our cybersecurity infrastructure. This article covers everything you should know about collision attacks.
By Josh Lake
in Information Security
on September 13, 2023
3DES used to be one of the most prominent forms of encryption. It is based on the DES algorithm, but has since been superseded by AES in most use cases.
By Josh Lake
in Information Security
on August 31, 2023
In this article, we discuss the underlying processes of the MD5 algorithm and how the math behind the MD5 hash function works.
By Josh Lake
in Information Security
on September 25, 2023