
Marc Dahan
Specialist in Online Privacy
Marc is a technology journalist with over 15 years experience. He specializes in content related to emerging technologies, cybersecurity, big data, privacy, artificial intelligence, and the politics of technology.
He has worked for some of the largest tech companies (Deluxe Digital, Sony, Autodesk) and is passionate about online privacy and digital freedom.
Articles by Marc
OpenVPN is one of the most widely-used VPN protocols available. In this post, we look at the protocol, in-depth, to expose how it works and whether it's safe to use.
By Marc Dahan
in VPN & Privacy
on November 10, 2023
Javascript sniffing attacks have been used to compromise some of the internet's biggest sites. In this post, we look at what Javascript sniffing attacks are and how you can prevent them.
By Marc Dahan
in Information Security
on December 20, 2021
Full path disclosure attacks can be difficult to detect and have serious consequences for your organization. We explain what full path disclosure attacks are and how to defend against them.
By Marc Dahan
in Information Security
on November 13, 2023
There's a lot you can do with pfSense. It's a very powerful firewall/router. In this post, we look at how to set up your own OpenVPN server in pfSense.
By Marc Dahan
in VPN & Privacy
on November 8, 2023
Compromised credentials can have nasty consequences. This post looks at how these attacks work and what can be done to prevent them.
By Marc Dahan
in Information Security
on October 20, 2023
Command and control attacks can be devastating to your organization. This post takes an in-depth look at command and control attacks and provides tips on how to defend against them.
By Marc Dahan
in Information Security
on September 25, 2023
As Iot devices grow in popularity, the number of threats that come with these devices is growing along with it. This post looks at the top 5 threats from IoT devices and what you can do to avoid them.
By Marc Dahan
in Information Security
on February 9, 2022
There are plenty of viruses that target devices, but macro viruses target applications - typically Word and Excel. In this post we look at how macro viruses work and what you can do to avoid them.
By Marc Dahan
in Information Security
on November 22, 2023
Pass the hash attacks can be very difficult to detect because attackers use "legitimate" credentials to pull them off. This post looks at how these attacks work and what you can do to defend against them.
By Marc Dahan
in Information Security
on September 28, 2023