Credential stuffing attacks are becoming more common, posing significant threats to internet security. In these attacks, hackers take sets of credentials that have been leaked through data breaches or other means, then attempt to use these credentials to log in to a user’s other accounts. Credential stuffing attacks are automated and performed at scale, making […]
There are so many different messaging apps on offer, and the differences can be highly technical. Check out our guide for a simple rundown of which apps you should be using to keep your data secure and private.
What happens to your Facebook account when you die? What about if someone close to you passes away; how do you deal with the Facebook account left behind?
DDoS attacks are growing in number and complexity as hackers adapt to new mitigation methods. Here’s the latest info on DDoS attacks in 2018 and 2019.
Gig economy websites like Upwork and Freelancer have notable identity verification flaws that allow account and identity fraud to flourish.
Steganography is the study and practice of concealing communication. It plays a different role to cryptography, with its own unique applications and strengths.
The fake tech support scam has become even more dangerous with the introduction of ransomware packages and easily installed keyloggers. Learn the danger signs and the way these scammers manipulate actual Windows tools to make people think their computers are infected with viruses.
The “anti-encryption laws” are a significant piece of legislation that could have worldwide security ramifications. Find out what they are and who they will affect in this comprehensive guide.
We explain what exploit kits are, how they work, and how cybercriminals use them. We also provide tips for preventing attacks.
Electronic and internet voting can help improve our election systems in several different ways. Each of these concepts rely on cryptography for security – but is cryptography enough?