How to secure your home wireless network
By in Information Security, on May 31, 2018 at 4:34 pm
How to secure your home wireless network

Unlike physical networks, wifi systems can extend beyond the walls of your home. Once the password for access gets out in the world, it is very difficult to control who can access your home network. Therefore, you need to consider implementing some changes and routines that protect you from intruders, snoopers, and internet carpetbaggers.

Common phishing scams and how to recognise and avoid them
By in Information Security, on May 29, 2018 at 2:08 pm
Common phishing scams and how to recognise and avoid them

Phishing for data continues to be a problem, but it’s no longer restricted to the internet. Here are the major attack vectors and tactics in use today.

What spear phishing is (with examples) and how can you avoid it
By in Information Security, on May 29, 2018 at 2:03 pm
What spear phishing is (with examples) and how can you avoid it

Spear phishing tactics use trust to scam victims. Find out more about spear phishing attempts, including some real world examples and tips for how avoid becoming a victim.

20 of the most interesting companies to visit at Infosec Europe 2018
By in Information Security, on May 23, 2018 at 5:39 pm
20 of the most interesting companies to visit at Infosec Europe 2018

Here we give you the lowdown on the most interesting companies at Infosec Europe 2018. Infosecurity Europe (Infosec) is the region’s most exciting information security event, featuring a broad range of conference programs, scores of exhibitors (400+) and inspiring speakers, and thousands (19,500+) of cybersecurity professionals, IT movers and shakers, entrepreneurs, and influencers from around […]

13+ free pentesting tools
By in Information Security, on May 15, 2018 at 11:02 am
13+ free pentesting tools

Free pentesting tools are staples in an ethical hacker’s toolkit. Here we showcase the best and most popular open-source ones on the internet. We have also found some useful pentesting tutorials to get you started, and some challenging online exercises to practice your ethical hacking skills.

Linux 2FA: How to secure SSH logins with Google Authenticator and Yubikey
By in Information Security, on May 14, 2018 at 6:15 pm
Linux 2FA: How to secure SSH logins with Google Authenticator and Yubikey

This article explains how to enable Yubikey One Time Passwords and Google Authenticator Two-Factor Authentication (2FA) on Linux.

How and where to get a scholarship in cybersecurity
By in Information Security, on May 9, 2018 at 4:22 pm
How and where to get a scholarship in cybersecurity

Schooling costs money, even for those looking to get started in cybersecurity. But as the industry grows, you can easily find cybersecurity scholarships from public and private sources. Here’s how to find free money to become a cybersec professional.

What a brute force attack is (with examples) and how you can protect against one
By in Information Security, on May 9, 2018 at 4:08 pm
What a brute force attack is (with examples) and how you can protect against one

A brute force attack can be used to obtain account credentials and enable unauthorized access to accounts. Find out more about what brute force attacks are and how to spot and block them.

How to secure your iPad or iPhone app permissions
By in Information Security, VPN & Privacy, on April 12, 2018 at 8:40 am
How to secure your iPad or iPhone app permissions

With so many apps available, all with different developers behind them, it’s difficult to know who to trust. You can err on the side of caution by securing you iPad or iPhone app permissions so you know who has access to what. Find out how to do this and more in order to keep your data safe.

Starting a career in cyber security: A guide for veterans
By in Information Security, on April 2, 2018 at 8:43 pm
Starting a career in cyber security: A guide for veterans

If you’re leaving active service and entering civilian life, you may be where to turn. Cyber security jobs are a great place for veterans, especially those holding active security clearances.

Page 3 of 11