Information Security News, Guides & Expert Analysis

The rates of hate crime and hate speech are increasing, with incidents taking place offline and online. We reveal the latest online hate crime statistics and facts that paint a picture of what we’re dealing with in the digital age.
By Aimee O'Driscoll in Information Security on January 16, 2024
Attackers can find and remotely access about one in 16 internet-connected home wi-fi routers using the manufacturer's default admin password, a Comparitech study has found. Victims could be at risk of eavesdropping, malware, hijacking, and more.
By Paul Bischoff in Information Security on August 8, 2023
Your IT department needs to operate a security operations center to protect your system and data. Find out about the best tools for the job.
By Stephen Cooper in Data Privacy Management on September 25, 2025
A software vendor for British Gas, the UK's biggest energy supplier, exposed 3.6 million customer email addresses on the web without a password. Customers might be at risk of phishing.
By Paul Bischoff in Information Security on June 1, 2021
Ransomware as a Service (RaaS) has become an increasingly popular tool among cyber criminals. We reveal what RaaS is and how you can avoid falling victim to it.
By Aimee O'Driscoll in Information Security on January 17, 2024
WannaCry is probably the most infamous strain of ransomware in the world, but there’s a real lack of understanding as to what it is, how it managed to compromise so many machines, and the scale of the impact it had just a few years ago. Today, we explore the history of WannaCry and explain how to prevent it from infecting your system with one easy step. 
By Ian Garland in Information Security on January 25, 2024
Remote code execution attacks can be quite nasty. In this article, we explain how RCE attacks work and what you can to to protect against them.
By Marc Dahan in Information Security on March 10, 2022
Session hijacking can leave you locked-out of your critical accounts. Read on to learn what session hijacking attacks are and what can be done to avoid them.
By Marc Dahan in Information Security on December 22, 2023
Page 20 of 42