Information Security
A recent Comparitech study found that while some organizations respond promptly to data breach disclosures, most don’t acknowledge such alerts at all.
By Aimee O'Driscoll in Data Breaches Studies on January 21, 2022
With digital privacy at the forefront of tech culture right now, there’s never been a better time to find out exactly what information your PC is storing in the background. Below, we’ll dispel a few of the most common Windows 10 spying myths and explain how to take back control of your diagnostic logs once and for all. 
By Ian Garland in Information Security on October 26, 2023
Comparitech researchers set up honeypots on the web to lure in attackers and record their actions. We recorded more than 100,000 attacks in 24 hours.
By Paul Bischoff in Information Security on March 15, 2022
Reverse tabnabbing is a common online attack that can compromise your online accounts. Thankfully, it's not hard to protect against it. We show you how in this post.
By Marc Dahan in Information Security on April 23, 2021
Finding trustworthy apps can be a tricky task at the best of times, and when it comes to your privacy, you simply can’t afford to choose poorly. That’s why we’ve tested numerous Android app lockers and brought you only the best.
By Ian Garland in Information Security on September 15, 2023
Many popular Android apps contain hardcoded credentials that can be found and abused by attackers against users, app developers, and APIs.
By Paul Bischoff in Information Security on March 15, 2022
Side-channel attacks don't target cryptographic systems, but their implementations instead. Find out how they can compromise secure algorithms.
By Josh Lake in Information Security on August 4, 2023
There are many different options for pursuing a career in cyber security. In this guide, we outline the most common types of cyber security roles, so you can get a sense of which one will best fit your interests and goals.
By Sam Woolfe in Information Security on April 13, 2021
Comparitech researchers found one in 50 Android apps requests unnecessary permissions to access private user data and take potentially dangerous actions.
By Paul Bischoff in Information Security on June 7, 2022
Page 16 of 46