Information Security
Plausible deniability seems like the ultimate get-out-of-jail-free card. But does it really work when it comes to encryption?
By Josh Lake in Information Security on January 8, 2024
Rooting your Android phone enables you to do some cool things with your phone you couldn't otherwise do. But what is rooting? How does it work? And what are the risks associated with rooting your Android phone?
By Marc Dahan in Information Security on October 29, 2020
The latest attempt by the U.S. government to undermine encryption is a piece of legislation called the EARN IT act. In this post, we break it down and discuss how it could affect privacy, free speech and encryption.
By Marc Dahan in Blog on November 10, 2021
Cybercriminals are buying and selling access to hacked RDP servers to conduct fraud and launch cyberattacks, Comparitech researchers found.
By Paul Bischoff in Information Security on March 15, 2022
It’s no secret that human error represents a weak link when it comes to cybersecurity. Find out exactly how serious an issue we face when it comes to everyday mistakes.
By Aimee O'Driscoll in Information Security on January 8, 2024
Shopping for firewall hardware and confused by the options? We reveal our top picks for the best firewall hardware for small businesses.
By Aimee O'Driscoll in Information Security on January 18, 2021
Names, emails, and phone numbers of 2.7 million Friendemic consumers in the US were exposed on a publicly accessible database without a password.
By Paul Bischoff in Information Security on March 15, 2022
We set up a honeypot by publishing AWS credentials in public GitHub repositories to find out how attackers find and abuse them.
By Paul Bischoff in Information Security on July 10, 2022
Gym and fitness club chain Town Sports left 600,000 customers' data unprotected on the web, researchers report.
By Paul Bischoff in Information Security on March 15, 2022
Page 22 of 46