author-image

Penny Hoelscher

Penny Hoelscher has a degree in journalism and a background in legacy programming. But, with an aversion to danger and conflict, she now combines interests in writing and IT safely from behind her computer screen.

Articles by Penny

In this article, we’ll be looking at how to wipe and secure external hard drives. Read on to find out more about why you might need to wipe your device and how to do it.
By Penny Hoelscher in Information Security on February 17, 2022
Looking to improve your security by encrypting your files or even your hard drives in Windows? We will walk you through every step so you can keep all of your sensitive data safe.
By Penny Hoelscher in VPN & Privacy on November 13, 2023
Becoming a Certified Ethical Hacker (CEH) can be a smart career move and can be incredibly lucrative. Find out how to learn ethical hacking and the best online courses available.
By Penny Hoelscher in Information Security on January 8, 2024
We explain what virus hoaxes are, how they work and how you can recognize them. We'll also give you
By Penny Hoelscher in Antivirus on August 18, 2020
Learn what a relay attack is, how it works, and how it can be prevented. By way of illustration, we will look at three examples of relay attacks. Car relay attacks, particularly, show the varied techniques criminals use to get into, and away with, your car.
By Penny Hoelscher in Information Security on August 3, 2023
Is the negative hype about Shodan – sometimes likened to George Orwell's Big Brother and labeled "the scariest search engine on the internet" – justified, or will this creepy crawler prove to be the most effective solution for protecting IoT devices against cyber attack?
By Penny Hoelscher in VPN & Privacy on August 4, 2023
We will explain what AES and TKIP are and suggest which option you should choose for your WPA2-supported devices. Choosing the best encryption mode is important for both security and the speeds on your device.
By Penny Hoelscher in Information Security on August 24, 2023
WPA3 is the latest certification program released by the Wi-Fi Alliance. Find out why it became necessary and where you might expect to use it.
By Penny Hoelscher in Information Security on October 19, 2023
Here we give you the lowdown on the most interesting companies at Infosec Europe 2018. Infosecurity
By Penny Hoelscher in Information Security on August 3, 2023
Page 1 of 2