Information Security News, Guides & Expert Analysis

Our information security category covers everything you need to keep your data and personal information private. Our experts cover AI, scams, hacking, the safety of popular apps and websites, and more.

Scholarship scams take advantage of students looking to help fund their education. We reveal how to spot and avoid common scholarship scams, as well as what to do if you've been caught out by one.
By Aimee O'Driscoll in Information Security on December 21, 2023
The personal information of hundreds of thousands on CenturyLink customers, including name, addresses, email addresses, and phone numbers was exposed online.
By Paul Bischoff in Information Security on October 18, 2019
We examine the techniques described by these sites and explore the possible sources of the shared cookies. 
By Sam Cook in Information Security on August 30, 2023
From sending fake invoices to manipulating employees into wiring them money, hackers have a wide range of business email compromise techniques that they use to defraud companies.
By Josh Lake in Information Security on July 6, 2020
Remote wiping your laptop or PC, coupled with full disk encryption, is the best way to protect your data if a computer is lost or stolen. This article explains the advantages of both and how to do them. 
By Josh Lake in Information Security on June 20, 2023
With a gender imbalance in the cybersecurity field, there are lots of initiatives that aim to get women more involved. We discuss the cybersecurity gender gap and reveal 33 initiatives that are helping to close it.
By Andra Zaharia in Information Security on February 9, 2024
Do you need to delete all of your posts on Facebook, Twitter, or Instagram? It's not as straightforward as you might think. Read on to find out how you can delete your posts in bulk with the help of apps and browser extensions.
By Aimee O'Driscoll in Information Security on April 16, 2022
Checksums are a simple means of making sure that data and software you download hasn't been corrupted. We'll show you how to validate checksums in Windows and Mac.
By Paul Bischoff in Information Security on September 16, 2023
Credential stuffing attacks are important to understand so you can keep your personal and business accounts safe. We explain how credential stuffing attacks work and how you can minimize the risk of attacks. 
By Josh Lake in Information Security on January 26, 2024
Page 30 of 42