How much are stolen frequent flyer miles worth on the dark web?
By in Information Security, on September 19, 2018 at 9:08 am
How much are stolen frequent flyer miles worth on the dark web?

We sifted through half a dozen illicit goods marketplaces on the dark web to find out just how much frequent flyer miles from hacked accounts are worth.

What is the best WPA2 security mode: AES, TKIP, or both?
By in Information Security, on September 13, 2018 at 2:40 pm
What is the best WPA2 security mode: AES, TKIP, or both?

In this article, we will explain what AES and TKIP are and suggest which option you should choose for your WPA2-supported devices

How to do your part for NCSAM by improving your own cybersecurity
By in Information Security, on September 12, 2018 at 3:24 pm
How to do your part for NCSAM by improving your own cybersecurity

October is National Cybersecurity Awareness Month! Find out how you can help the fight against cybercrime by improving your own online security.

Analysis: How data breaches affect stock market share prices (2018 update)
By in Information Security, on September 6, 2018 at 9:49 am
Analysis: How data breaches affect stock market share prices (2018 update)

Data breaches can have serious consequences for companies and customers but what impact do they have on share prices? We dig in to the data to find out.

What is WPA3, is it secure and should I use it?
By in Information Security, on August 27, 2018 at 2:16 pm
What is WPA3, is it secure and should I use it?

Is WPA3 secure? This is the latest burning question in wifi security after a serious vulnerability was found in Wifi Protected Access 2 (WPA2), the security standard used by most wifi networks. WPA3 improves upon its predecessor and is now the recommended standard to protect wifi.

The Ransomware Removal Handbook: Dealing with common strains of ransomware
By in Information Security, on August 26, 2018 at 7:17 pm
The Ransomware Removal Handbook: Dealing with common strains of ransomware

Ransomware is a growing danger for individuals and businesses. The good news is that Ransomware removal is possible. Our guide will tell you how.

Cyber security and remote working: What are the risks and how can you mitigate them?
By in Information Security, on August 7, 2018 at 5:53 pm
Cyber security and remote working: What are the risks and how can you mitigate them?

The issue of security and remote working can be a headache for digital workers and their employers. Here we investigate risks and solutions.

What is Vishing (with example scams) and how to recognize and avoid it
By in Information Security, on July 24, 2018 at 9:40 am
What is Vishing (with example scams) and how to recognize and avoid it

Are you getting suspicious spam phone calls? You could be a target for voice phishing, also known as vishing. Here’s a guide on how to avoid vishing scams.

Did USB fans given to journalists at Trump-Kim Summit contain spyware?
By in Information Security, on July 3, 2018 at 2:51 pm
Did USB fans given to journalists at Trump-Kim Summit contain spyware?

Security experts cautioned the USB fans handed out to members of the press may be a ploy to infect devices with malware. We got our hands on one to find out.

How to securely erase external hard drives, SD cards, or flash drives
By in Information Security, on June 21, 2018 at 1:01 pm
How to securely erase external hard drives, SD cards, or flash drives

Learn how to securely erase external storage devices, like SD cards, USB sticks, or flash drives using apps for various operating systems.

Page 1 of 11