Information Security News, Guides & Expert Analysis
Your IT department needs to operate a security operations center to protect your system and data. Find out about the best tools for the job.
A software vendor for British Gas, the UK's biggest energy supplier, exposed 3.6 million customer email addresses on the web without a password. Customers might be at risk of phishing.
Ransomware as a Service (RaaS) has become an increasingly popular tool among cyber criminals. We reveal what RaaS is and how you can avoid falling victim to it.
WannaCry is probably the most infamous strain of ransomware in the world, but there’s a real lack of understanding as to what it is, how it managed to compromise so many machines, and the scale of the impact it had just a few years ago. Today, we explore the history of WannaCry and explain how to prevent it from infecting your system with one easy step.
Remote code execution attacks can be quite nasty. In this article, we explain how RCE attacks work and what you can to to protect against them.
Session hijacking can leave you locked-out of your critical accounts. Read on to learn what session hijacking attacks are and what can be done to avoid them.
Comparitech researchers accessed an unsecured Facebook bot farm used to control nearly 14,000 fake accounts. Here’s what we found.
If you receive a message from someone who claims to own images on your site and threatens legal action, don't click the link! It might well be a phishing scam.