Information Security
BadUSB disguises itself as a human interface device and covertly executes malicious commands or opens virus payloads on the target computer. Learn how you can prevent them.
By John Cirelly in Information Security on January 10, 2023
An unsecured database containing international travel records dating back 10 years was left exposed on the web.
By Paul Bischoff in Information Security on September 20, 2021
Unpacking the $9.45bn impact of ransomware attacks on US schools and colleges: Explore the financial
By Paul Bischoff in Information Security on July 4, 2023
In this article, we discuss the underlying processes of the MD5 algorithm and how the math behind the MD5 hash function works.
By Josh Lake in Information Security on September 25, 2023
MD5 is a cryptographic hash function that is no longer considered safe for many purposes. Find out why and what to use instead.
By Josh Lake in Information Security on December 28, 2023
Most phone scams now utilize number spoofing techniques. We explore how number spoofing works and how to avoid these scams.
By Sam Cook in Information Security on August 9, 2023
Germany is far from immune to the impacts of cyber crime. We’ve rounded up some of the most interesting cyber security and cyber crime statistics for the country.
By Aimee O'Driscoll in Information Security on February 28, 2024
Personal details of 35 million residents in and around Chicago, Los Angeles, and San Diego were exposed online. The database owner is still unknown.
By Paul Bischoff in Information Security on July 29, 2021
Page 13 of 46