author-image

Josh Lake

Josh Lake is a writer who focuses on the intersections between technology, privacy and security. His work helps companies and individuals get the most out of technological developments, without having to sacrifice their civil liberties or open themselves up to the ever-increasing threats of cybercrime.

Articles by Josh

The SHA-2 algorithm is a key component of your everyday online security. Find out how SHA-256 and its related algorithms work in our guide.
By Josh Lake in Information Security on December 13, 2023
3DES used to be one of the most prominent forms of encryption. It is based on the DES algorithm, but has since been superseded by AES in most use cases.
By Josh Lake in Information Security on August 31, 2023
Integer overflow attacks exploit coding flaws and can have serious consequences. Learn about integer overflow attack examples in our guide.
By Josh Lake in Information Security on September 11, 2023
Hackers can use packet sniffing attacks to spy on your data. Find out what they are, check out some examples, and learn how to defend against them.
By Josh Lake in Information Security on November 1, 2023
The right ad-blocking filter lists can make your browsing experience much more pleasant. Find out how to set up the ideal system in our guide.
By Josh Lake in VPN & Privacy on September 13, 2023
In this article, we discuss the underlying processes of the MD5 algorithm and how the math behind the MD5 hash function works.
By Josh Lake in Information Security on September 25, 2023
MD5 is a cryptographic hash function that is no longer considered safe for many purposes. Find out why and what to use instead.
By Josh Lake in Information Security on December 28, 2023
Cross-site request forgeries are complex attacks that exploit predictable request parameters. They lead to state changes that can cause significant harm to victims.
By Josh Lake in Information Security on May 14, 2021
Side-channel attacks don't target cryptographic systems, but their implementations instead. Find out how they can compromise secure algorithms.
By Josh Lake in Information Security on August 4, 2023
Page 2 of 7