Information Security News, Guides & Expert Analysis
We will explain what AES and TKIP are and suggest which option you should choose for your WPA2-supported devices. Choosing the best encryption mode is important for both security and the speeds on your device.
Whether you're looking to buy a new router or simply want to upgrade your current router's security, you'll want to ensure it supports WPA3. In this post, we provide an overview of WPA3.
Phishing attacks come in many different flavors - a popular one is vishing. In this post, we explore what vishing is, how it works, and what you can do to protect yourself against it.
Security experts cautioned the USB fans handed out to members of the press may be a ploy to infect d
The small packets of data that routinely travel across the internet can be intercepted and interrogated by all manner of ne'er-do-wells. We find out what makes packet sniffing dangerous and how best to protect your traffic.
Malware is malicious software that acts counter to the interests of the computer that hosts it. Viru
Whaling is a devastating type of phishing attack, and unfortunately, it's becoming more common. Read on to learn everything you need to know about whaling and how to protect your business.
Once your wifi access gets out into the world, it can be difficult to protect your home wireless network from intrusion. We explain simple changes you can make along with best practices to protect your home network from hackers.
Spear phishing can be the cause of huge financial losses, both for individuals and businesses. We explain exactly what a spear phishing attack is (with examples) and the best practices to avoid becoming a victim.