Information Security
DNS changer malware can cause your computer to visit a different IP address than the one you intended. This guide tells you how to detect infections – and how to avoid them in the first place.
By Jon Watson in Information Security on October 18, 2023
We issued each of them a challenge: explain blockchain in 150 words or less. As it turns out, even t
By Paul Bischoff in Information Security on January 19, 2023
Spear phishing can happen to anyone, as one woman learned when an imposter on Facebook stole all of
By Paul Bischoff in Information Security on April 12, 2019
If your computer is acting up, you might want to try restarting it into safe mode. This guide will h
By Sam Cook in Information Security on December 18, 2018
Ads & malware are served up by thousands of servers on the internet. We shows how to use your comput
By Dave Albaugh in Information Security on January 2, 2019
With the rapid growth of the IoT more and more of our data can be accessed through connected devices
By Richard Patterson in Information Security on March 27, 2017
Interested in hardening your databases against SQL injection? We explain five key ways to prevent these attacks (with code samples) and help mitigate the damage if you do experience a breach.
By Dave Albaugh in Information Security on October 14, 2020
Businesses might be advertising on fake news sites without realizing it. Learn how to stop the sprea
By Paul Bischoff in Information Security on March 15, 2022
Looking to freeze your SSN or see if it's being used without your knowledge? We'll explain how, as well as what to do if someone has your social security number.
By Sam Cook in Information Security on August 25, 2023
Page 42 of 46