Information Security
Receiving scam calls? Voice phishing, or vishing, is on the rise. In this post, we'll explain what a vishing scam is, how to recognize it, and what you can do to stay safe.
By Sam Cook in Information Security on November 24, 2021
Security experts cautioned the USB fans handed out to members of the press may be a ploy to infect d
The small packets of data that routinely travel across the internet can be intercepted and interrogated by all manner of ne'er-do-wells. We find out what makes packet sniffing dangerous and how best to protect your traffic.
By Jon Watson in Information Security on January 5, 2024
Phishing is a nasty business that runs 24/7/365. During tax season, a special type of phishing attac
By Dave Albaugh in Information Security on December 2, 2019
Malware is malicious software that acts counter to the interests of the computer that hosts it. Viru
By Stephen Cooper in Information Security on November 17, 2023
Whaling is a devastating type of phishing attack, and unfortunately, it's becoming more common. Read on to learn everything you need to know about whaling and how to protect your business.
By Stephen Cooper in Information Security on August 25, 2023
Once your wifi access gets out into the world, it can be difficult to protect your home wireless network from intrusion. We explain simple changes you can make along with best practices to protect your home network from hackers.
By Stephen Cooper in Information Security on September 6, 2023
Spear phishing can be the cause of huge financial losses, both for individuals and businesses. We explain exactly what a spear phishing attack is (with examples) and the best practices to avoid becoming a victim.
By Aimee O'Driscoll in Information Security on October 19, 2020
Here we give you the lowdown on the most interesting companies at Infosec Europe 2018. Infosecurity
By Penny Hoelscher in Information Security on August 3, 2023
Page 37 of 46