Information Security
Credential dumping attacks are a type of credential-based attacks and they can be difficult to detect. This post looks at how credential dumping works and what you can do about it.
By Marc Dahan in Information Security on September 22, 2023
Web browsers enable us to access all kinds of content. Because of that, they're a tempting target for hackers. We look at the top six web browser vulnerabilities and what you can do to avoid them.
By Marc Dahan in Information Security on October 19, 2023
Mobile devices are ubiquitous today - and so are the vulnerabilities they can harbour. This post looks at the most common mobile code vulnerabilities and how to mitigate them.
By Marc Dahan in Information Security on March 23, 2022
Botnets are a growing trend for cybercriminals to unleash a string of attacks on unsuspecting victims. We've collated some shocking statistics to understand the impact botnets have on the internet.
By Craig McCart in Information Security on October 31, 2022
Ever received a WhatsApp message from a friend asking for money? It could be a scam. Read our WhatsApp scam article to ensure you never let the fraudsters win.
By Craig McCart in Information Security on September 8, 2023
Password cracking is one of the tools that hackers turn to when they can't gain access to an account by other means. Find out how they do it.
By Josh Lake in Information Security on November 22, 2023
Javascript sniffing attacks have been used to compromise some of the internet's biggest sites. In this post, we look at what Javascript sniffing attacks are and how you can prevent them.
By Marc Dahan in Information Security on December 20, 2021
Full path disclosure attacks can be difficult to detect and have serious consequences for your organization. We explain what full path disclosure attacks are and how to defend against them.
By Marc Dahan in Information Security on November 13, 2023
Page 8 of 46