Information Security
Ever wondered who is more likely to be targeted by online scammers? We reveal some surprising internet safety statistics as well as easy to follow advice to protect yourself from online scams.
By Aimee O'Driscoll in Information Security on July 21, 2020
The domain name system is complex, which leaves it open to a range of DNS attacks. Find out what the different types of DNS attacks are and how to defend against them.
By Josh Lake in Information Security on October 30, 2023
If you think leaving user data exposed online for "just a day" is no big deal, think again.
By Paul Bischoff in Information Security on March 16, 2022
Worried you may be at risk to pharming attacks? We explain what pharming is, the difference between pharming and phishing, plus how to keep your computer safe.
By Aimee O'Driscoll in Information Security on December 8, 2023
A 5.0GB database belonging to the French Civic Service exposed nearly 1.4 million records on the web without a password or any authentication required to access it, Comparitech researchers report. The Agence du Service Civique recruits 19–25-year-olds for volunteer work.
By Paul Bischoff in Information Security on March 15, 2022
Although many restaurants' user accounts are available on dark web marketplaces, few have sold as widely as Domino's Pizza accounts. We explain how accounts have been hacked and how you can secure your account in the future.
By Sam Cook in Information Security on May 18, 2020
Protecting customer PII is complicated for small businesses, but data breaches are much worse. Find out what PII is and how to keep it safe.
By Josh Lake in Information Security on March 15, 2022
Common misconfigurations on Google Firebase databases allow unauthorized parties to easily find and access users' personal data in thousands of apps.
By Paul Bischoff in Information Security on May 30, 2021
Worried about the safety of Zoom? With so many people using Zoom meetings for work it's important to know how to keep your sensitive data safe. We explain the essential steps you can take to keep your Zoom meetings private and secure.
By Amakiri Welekwe in Information Security on March 15, 2022
Page 25 of 46