If you use WebDAV for file transfers, you need a good WebDAV client. We assess the options.
By Stephen Cooper
in Net Admin
on April 10, 2024
3DES used to be one of the most prominent forms of encryption. It is based on the DES algorithm, but has since been superseded by AES in most use cases.
By Josh Lake
in Information Security
on August 31, 2023
Are you looking for a VPN to keep your online activities secure while in Bangladesh? We reveal the best VPNs for Bangladesh plus how you can still access Bangladeshi websites from abroad.
By Osman Husain
in VPN & Privacy
on May 3, 2024
Collision attacks threaten the security of cryptographic hash functions, which form critical parts of our cybersecurity infrastructure. This article covers everything you should know about collision attacks.
By Josh Lake
in Information Security
on September 13, 2023
Credential stuffing attacks are important to understand so you can keep your personal and business accounts safe. We explain how credential stuffing attacks work and how you can minimize the risk of attacks.
By Josh Lake
in Information Security
on January 26, 2024
Continuous testing is the best solution for checking on new code in a CI/CD environment.
By Stephen Cooper
in Net Admin
on August 30, 2024
Side-channel attacks don't target cryptographic systems, but their implementations instead. Find out how they can compromise secure algorithms.
By Josh Lake
in Information Security
on August 4, 2023
The right ad-blocking filter lists can make your browsing experience much more pleasant. Find out how to set up the ideal system in our guide.
By Josh Lake
in VPN & Privacy
on September 13, 2023
Cross-site request forgeries are complex attacks that exploit predictable request parameters. They lead to state changes that can cause significant harm to victims.
By Josh Lake
in Information Security
on May 14, 2021