Marc Dahan

Marc is a technology journalist with over 15 years experience. He specializes in content related to emerging technologies, cybersecurity, big data, privacy, artificial intelligence, and the politics of technology. He has worked for some of the largest tech companies, such as Deluxe Digital, Sony and Autodesk. During his time at Autodesk, he gave a series of talks on digital security and privacy, designed to give people the means to secure various aspects of their digital lives. Marc is passionate about online privacy and digital freedom.

Articles by Marc

There are plenty of viruses that target devices, but macro viruses target applications - typically Word and Excel. In this post we look at how macro viruses work and what you can do to avoid them.
By Marc Dahan in Information Security on November 22, 2023
Pass the hash attacks can be very difficult to detect because attackers use "legitimate" credentials to pull them off. This post looks at how these attacks work and what you can do to defend against them.
By Marc Dahan in Information Security on September 28, 2023
If your infrastructure is vulnerable to server-side request forgery attacks, the consequences could be devastating to your organization. We explain how SSRF attacks work and how you can avoid them.
By Marc Dahan in Information Security on November 13, 2023
You may not have heard of typosquatting before but it can have some pretty serious consequences. This post looks at how typosquatting works and what you can do to defend against it.
By Marc Dahan in Information Security on January 23, 2022
Form action Hijacking attacks can compromise your personal information online. In this post, we look at how that attack works and what you can do to prevent them.
By Marc Dahan in Information Security on October 26, 2023
Masquerade attacks can be difficult to detect because the attackers use valid credentials. This post takes looks at how masquerade attacks work and provides tips on how to defend against them.
By Marc Dahan in Information Security on February 4, 2022
Software vulnerabilities are quite common but if even one of them turns out to be a zero-day, the damage could be massive. We look at what zero-day exploits are and what you can do about them.
By Marc Dahan in Information Security on June 27, 2023
Shadow IT is a unique vulnerability insofar as it's largely unintentional. In this article we look at what shadow IT is, what its risks are and how to mitigiate them.
By Marc Dahan in Information Security on June 29, 2022
In this post we take a deep dive into Apple's proposed client-side CSAM scanning to find out what all the fuss is about.
By Marc Dahan in Information Security on December 15, 2021
Page 10 of 14