TrueCrypt is discontinued, try these free alternatives
By in Information Security, on November 12, 2016 at 10:34 am
TrueCrypt is discontinued, try these free alternatives

TrueCrypt has been discontinued under mysterious circumstances. We recommend six other disk encryption tools as alternatives.

The Complete Beginner’s Guide to SSL Encryption
By in Information Security, on November 8, 2016 at 10:05 am
The Complete Beginner’s Guide to SSL Encryption

What is the Secure Socket Layer? Why is it a leading standard? We take a close look at SSL and everything it entails in this beginner’s guide to SSL.

Halloween cyber security nightmares and how to avoid them
By in Information Security, on October 28, 2016 at 11:26 am
Halloween cyber security nightmares and how to avoid them

Some very modern Halloween scare stories ranging from hackers taking control of your car to your webcam spying on you and demanding a ransom.

How to make and remember strong passwords
By in Information Security, on October 13, 2016 at 6:52 pm
How to make and remember strong passwords

Long, hard and oh-so tricky to get your mouth around. No, this not an intro to the type of websites you should be wary of visiting but is, instead, a guide to creating complex passwords that cannot easily be guessed or cracked with cracking software.

Time to get Security Serious and clean up those old accounts
By in Information Security, on October 3, 2016 at 9:21 pm
Time to get Security Serious and clean up those old accounts

Nearly half of us don’t delete old online accounts. Here’s why you should and four more things you can do for Security Serious week.

A Beginner’s Guide to Cryptography & Some Useful Resources
By in Information Security, on August 30, 2016 at 10:10 am
A Beginner’s Guide to Cryptography & Some Useful Resources

A list of cryptography resources including websites, organizations, influencers, books, papers, newsgroups, newsletters, and more.

How to spot a fake, spoof or phishing email
By in Information Security, on August 24, 2016 at 7:56 am
How to spot a fake, spoof or phishing email

Fake emails phishing for your personal data can look surprisingly like the real thing. Here’s how to spot one so you don’t get caught out.

How to secure your webcam
By in Information Security, on August 17, 2016 at 9:22 am
How to secure your webcam

Chances are your laptop has a webcam, but could it be spying on you? We take a look at how secure webcams are and what you can do to mitigate the risks.

Is Skype Safe and Secure? What are the Alternatives?
By in Information Security, on July 20, 2016 at 12:16 pm
Is Skype Safe and Secure? What are the Alternatives?

Is Skype a good option for those who value their privacy and security? We take a look at how safe and secure Skype is and what the alternatives are.

Pros and cons of password managers – Lee Munson vs. Simon Edwards
By in Information Security, on May 19, 2016 at 12:02 pm
Pros and cons of password managers – Lee Munson vs. Simon Edwards

Our own Lee Munson goes head-to-head with SE Labs Director Simon Edwards to make the case for and against the use of password managers

Page 10 of 12