Information Security
SSH is a security protocol used for remote login, tunneling and much more. Find out how it works, what it does and whether it is secure.
By Josh Lake in Information Security on November 22, 2023
UK readers, beware of this scam targeting BT Internet customers over the phone that cost one woman £34,000. Tech support scams like these often target the elderly and vulnerable, so be sure to warn your parents and grandparents.
By Paul Bischoff in Information Security on March 22, 2022
Quantum computing looks like it could revolutionize our technological world in the not too distant future. Find out what it is and how it may affect our security.
By Josh Lake in Information Security on August 2, 2023
Ransomware is a particularly invasive form of malware that typically takes over a victim’s data or device and holds it hostage until a sum of money is handed over to secure its release.
By Sam Cook in Information Security on March 7, 2024
The Diffie-Hellman key exchange was one of the most important developments in public-key cryptography. Find out why it's still such an important aspect of internet security.
By Josh Lake in Information Security on August 24, 2023
68 percent of secondhand USB flash drives sold in the US, and 67 percent sold in the UK, still contain recoverable data from their previous owners, according to a new study by the University of Hertfordshire and commissioned by Comparitech.
By Paul Bischoff in Information Security on March 13, 2019
Social engineering is a tactic used by cybercriminals to manipulate people into divulging information, often with the ultimate goal of financial gain. Find out more about what social engineering is and why it works, as well as what you can do to avoid it.
By Lee Munson in Information Security on January 3, 2024
Facial recognition is now mainstream. There’s a new battle is between privacy and surveillance, an
By Victoria McIntosh in Information Security on October 22, 2020
The development of AI techniques has seen Artificial Intelligence (AI) start to appear in a lot of different IT products, including in the field of cybersecurity. Read about the leading cybersecurity companies spearheading AI initiatives.
By Stephen Cooper in Information Security on April 1, 2024
Page 42 of 56