20 of the most interesting companies to visit at Infosec Europe 2018
By in Information Security, on May 23, 2018 at 5:39 pm
20 of the most interesting companies to visit at Infosec Europe 2018

Here we give you the lowdown on the most interesting companies at Infosec Europe 2018. Infosecurity Europe (Infosec) is the region’s most exciting information security event, featuring a broad range of conference programs, scores of exhibitors (400+) and inspiring speakers, and thousands (19,500+) of cybersecurity professionals, IT movers and shakers, entrepreneurs, and influencers from around […]

13+ free pentesting tools
By in Information Security, on May 15, 2018 at 11:02 am
13+ free pentesting tools

Free pentesting tools are staples in an ethical hacker’s toolkit. Here we showcase the best and most popular open-source ones on the internet. We have also found some useful pentesting tutorials to get you started, and some challenging online exercises to practice your ethical hacking skills.

Linux 2FA: How to secure SSH logins with Google Authenticator and Yubikey
By in Information Security, on May 14, 2018 at 6:15 pm
Linux 2FA: How to secure SSH logins with Google Authenticator and Yubikey

This article explains how to enable Yubikey One Time Passwords and Google Authenticator Two-Factor Authentication (2FA) on Linux.

How and where to get a scholarship in cybersecurity
By in Information Security, on May 9, 2018 at 4:22 pm
How and where to get a scholarship in cybersecurity

Schooling costs money, even for those looking to get started in cybersecurity. But as the industry grows, you can easily find cybersecurity scholarships from public and private sources. Here’s how to find free money to become a cybersec professional.

What a brute force attack is (with examples) and how you can protect against one
By in Information Security, on May 9, 2018 at 4:08 pm
What a brute force attack is (with examples) and how you can protect against one

A brute force attack can be used to obtain account credentials and enable unauthorized access to accounts. Find out more about what brute force attacks are and how to spot and block them.

How to secure your iPad or iPhone app permissions
By in Information Security, VPN & Privacy, on April 12, 2018 at 8:40 am
How to secure your iPad or iPhone app permissions

With so many apps available, all with different developers behind them, it’s difficult to know who to trust. You can err on the side of caution by securing you iPad or iPhone app permissions so you know who has access to what. Find out how to do this and more in order to keep your data safe.

Starting a career in cyber security: A guide for veterans
By in Information Security, on April 2, 2018 at 8:43 pm
Starting a career in cyber security: A guide for veterans

If you’re leaving active service and entering civilian life, you may be where to turn. Cyber security jobs are a great place for veterans, especially those holding active security clearances.

How to recognize and avoid common tax scams (USA & Canada)
By in Information Security, on March 6, 2018 at 9:43 pm
How to recognize and avoid common tax scams (USA & Canada)

Learn how to recognize, avoid, and report common tax scams in the USA and Canada with our helpful guide, now updated for 2018.

What is sandboxing and how to sandbox a program
By in Information Security, on March 2, 2018 at 6:10 pm
What is sandboxing and how to sandbox a program

Sandboxing computer programs keeps them separated from each other which prevents the spread of malware and makes systems more stable.

Beware of this very convincing IRS tax return scam in 2018
By in Information Security, on February 20, 2018 at 9:21 am
Beware of this very convincing IRS tax return scam in 2018

If a collection agent calls demanding money you received in this year’s tax return, you might be the target of an IRS scam.

Page 1 of 9