Cross-site scripting (XSS) is an extremely common kind of online attack that targets web applications and websites. In this article, we look at what XSS attacks are, how they work, and how you can prevent them.
Trojan Horses are one of the most successful malware attacks. In this post we look at what Trojan Horse malware is, what it does and how you can avoid it.
In this review, we’ll dive into the different types of problems Graylog can solve, as well as the two different types of log management products Graylog offers to its customers.
Comparitech researchers have uncovered five critical cybersecurity flaws in Western Digital network-attached storage (NAS) devices. The vulnerabilities found affect tens of thousands of Western Digital My Cloud NAS devices globally.
The latest attempt by the U.S. government to undermine encryption is a piece of legislation called the EARN IT act. In this post, we break it down and discuss how it could affect privacy, free speech and encryption.
It’s no secret that human error represents a weak link when it comes to cybersecurity. Find out exactly how serious an issue we face when it comes to everyday mistakes.