Marc Dahan profile pic

Marc Dahan

Marc is a technology journalist with over 15 years experience. He specializes in content related to emerging technologies, cybersecurity, big data, privacy, artificial intelligence, and the politics of technology.

He has worked for some of the largest tech companies (Deluxe Digital, Sony, Autodesk) and is passionate about online privacy and digital freedom.

Articles by Marc

Having a hard time choosing between CyberGhost and AVG VPN? Not to worry. This detailed comparison looks at everything from privacy, security, pricing, streaming, and more. 
By Marc Dahan in VPN & Privacy on October 19, 2022
Trying to choose between CyberGhost and OVPN? In this detailed comparison, we look at everything from privacy, security, pricing, streaming, and more. Check it out below.
By Marc Dahan in VPN & Privacy on January 21, 2024
Struggling to choose between CyberGhost and Hide My Ass? This detailed comparison looks at everything from safety, security, pricing, streaming, and more. 
By Marc Dahan in VPN & Privacy on December 11, 2023
Like most injection attacks, LDAP injection can be nasty. This post looks at how these LDAP attacks are pulled off and how to avoid them.
By Marc Dahan in Information Security on June 19, 2022
Juice jacking attacks can lead to theft of your personal information and to malware infections. This post looks at what juice jacking is and how to avoid it happening to you. 
By Marc Dahan in Information Security on September 27, 2023
WireGuard is quickly becoming the new go to VPN protocol. In this post, we explain how to configure a WireGuard connection to a VPN provider in pfSense.
By Marc Dahan in VPN & Privacy on November 4, 2022
Credential dumping attacks are a type of credential-based attacks and they can be difficult to detect. This post looks at how credential dumping works and what you can do about it.
By Marc Dahan in Information Security on September 22, 2023
Web browsers enable us to access all kinds of content. Because of that, they're a tempting target for hackers. We look at the top six web browser vulnerabilities and what you can do to avoid them.
By Marc Dahan in Information Security on October 19, 2023
Mobile devices are ubiquitous today - and so are the vulnerabilities they can harbour. This post looks at the most common mobile code vulnerabilities and how to mitigate them.
By Marc Dahan in Information Security on March 23, 2022
Page 10 of 15