Information Security
In this article, we’ll be looking at how to wipe and secure external hard drives. Read on to find out more about why you might need to wipe your device and how to do it.
By Penny Hoelscher in Information Security on February 17, 2022
3DES used to be one of the most prominent forms of encryption. It is based on the DES algorithm, but has since been superseded by AES in most use cases.
By Josh Lake in Information Security on August 31, 2023
Command and control attacks can be devastating to your organization. This post takes an in-depth look at command and control attacks and provides tips on how to defend against them.
By Marc Dahan in Information Security on September 25, 2023
There are plenty of viruses that target devices, but macro viruses target applications - typically Word and Excel. In this post we look at how macro viruses work and what you can do to avoid them.
By Marc Dahan in Information Security on November 22, 2023
Pass the hash attacks can be very difficult to detect because attackers use "legitimate" credentials to pull them off. This post looks at how these attacks work and what you can do to defend against them.
By Marc Dahan in Information Security on September 28, 2023
You may not have heard of typosquatting before but it can have some pretty serious consequences. This post looks at how typosquatting works and what you can do to defend against it.
By Marc Dahan in Information Security on January 25, 2024
Form action Hijacking attacks can compromise your personal information online. In this post, we look at how that attack works and what you can do to prevent them.
By Marc Dahan in Information Security on October 26, 2023
Masquerade attacks can be difficult to detect because the attackers use valid credentials. This post takes looks at how masquerade attacks work and provides tips on how to defend against them.
By Marc Dahan in Information Security on December 21, 2023
Software vulnerabilities are quite common but if even one of them turns out to be a zero-day, the damage could be massive. We look at what zero-day exploits are and what you can do about them.
By Marc Dahan in Information Security on June 27, 2023
Page 15 of 42