Information Security
Hackers can use packet sniffing attacks to spy on your data. Find out what they are, check out some examples, and learn how to defend against them.
By Josh Lake in Information Security on November 1, 2023
In this post we take a deep dive into Apple's proposed client-side CSAM scanning to find out what all the fuss is about.
By Marc Dahan in Information Security on December 15, 2021
Path traversal attacks may not get as much attention as other online attacks but they can be quite nasty. In this post, we look at how path traversal attacks work and how to prevent them.
By Marc Dahan in Information Security on November 15, 2023
Millions of anonymous messages and user records apparently from the secret sharing app Whisper were exposed online without a password. Again.
By Bob Diachenko in Information Security on February 1, 2022
Watering hole attacks can be devastating to organizations - and they're quite common. In this post we explain what watering hole attacks are and how you can avoid them.
By Marc Dahan in Information Security on January 25, 2024
Cybersecurity risk management is the continuous process of identifying, analyzing, evaluating, and addressing an organization’s cyber security threats. Learn how to design and implement your security processes.
By Liku Zelleke in Information Security on March 5, 2024
Exposed names, email addresses, and IP addresses could put millions of Stripchat users at risk.
By Paul Bischoff in Information Security on August 30, 2023
Web cache poisoning attacks can put your web site/application at risk, as well as your users. In this post, we look at how web cache poisoning attacks work and what you can do to prevent them.
By Marc Dahan in Information Security on December 21, 2023
Format string attacks can be quite severe, luckily it's not too difficult to defend against them. In this article we look at how to do just that.
By Marc Dahan in Information Security on September 28, 2023
Page 11 of 46