Information Security
Social Data says it only takes public data from public profiles, but scraping is strictly against most social networks' terms of use.
By Paul Bischoff in Information Security on May 30, 2021
Immunity passports may seem like a natural fit at this time, but we have a duty to ensure that the underlying technology does not undermine our privacy rights and individual freedoms.
By Amakiri Welekwe in Information Security on August 14, 2020
Fraudsters often use emails, texts, phone calls, and pretexting scenarios to extract sensitive information. We reveal everything you need to know about pretexting attacks including examples and how to defend yourself.
By Amakiri Welekwe in Information Security on January 8, 2024
One of the key questions to ponder when using Google Drive cloud storage is: are my files secure and private? We take a closer look at Google Drive security, and offer steps you can take to improve it.
By Amakiri Welekwe in Information Security on September 21, 2023
Hacking incidents are on the rise. Most go undetected long before the victim realizes what happened. Here are 10 clear signs you can use to tell if your phone or computer has been hacked.
By Amakiri Welekwe in Information Security on December 13, 2023
Health officials in Argentina exposed a database on the web containing personal information from people who applied for COVID-19 circulation permits, which exempt recipients from quarantine restrictions.
By Paul Bischoff in Information Security on July 30, 2020
Done with Twitter and want to get rid of your account as quickly as possible? We reveal how to quickly delete your Twitter profile and ensure your data is permanently wiped.
By Aimee O'Driscoll in Information Security on August 10, 2023
Advanced persistent threats (APTs) are the most complex cyberattacks. They are generally mounted by groups linked to nation-states and target highly valuable systems and data. We explain what APTs are and how to defend against them.
By Josh Lake in Information Security on January 5, 2024
We put a MongoDB honeypot on the web for three months to see who would attempt to view, steal, and destroy exposed data.
By Paul Bischoff in Information Security on March 15, 2022
Page 24 of 46