Security & Protection

The Four Data Security Best Practices You Should Adopt Today

Crimes involving information systems are becoming more and more common and malicious actors are developing increasingly complex methods of getting their hands on our personal information. It is more important than ever that you take serious steps to protect sensitive data via robust data security measures. But what exactly does that involve and what steps …

The Four Data Security Best Practices You Should Adopt Today Read More »

A Very Quick and Simple Guide to Encryption

The term ‘encryption’ features at the heart of conversations about data protection, and the majority of people are aware that it plays an important role in information security. However, very few of us know how it actually works. Here’s everything you need to know about encryption in a nutshell. What is encryption? Encryption involves modifying …

A Very Quick and Simple Guide to Encryption Read More »

Staying Private in Public: Keeping your Information Confidential on Facebook

Many users would be reluctant to give up Facebook, given its position as many people’s number one social network. However, there is very considerable unease regarding the amount of information the company gathers about its users. Once you’re on Facebook, the company effectively has you hooked, following you around the Internet to find out your …

Staying Private in Public: Keeping your Information Confidential on Facebook Read More »

The Dangers of Password Autofills

It appears that some advertising networks are now using tracking scripts to harvest the email addresses that your password manager enters into websites as part of the autofill function. That alone would be cause for concern, but it appears the same technology could be used to harvest your password as well. This applies to all …

The Dangers of Password Autofills Read More »

Why You Need to Prepare For Windows 7 & Windows Server 2008 End Of Life

All good things must come to an end, including the business software that you have likely been using for years. In the tech field, we call this End of Life. This basically means that the developer will no longer issue security updates, fix bugs and flaws, or offer support. And now its Windows 7 and Windows …

Why You Need to Prepare For Windows 7 & Windows Server 2008 End Of Life Read More »

News Bytes – May

$2000 for a failing phone? The new Samsung Galaxy Fold, which was supposed to introduce ground-breaking new foldable smartphone technology, is beset with problems after claims from reviewers and early adopters that the technology is easy to break. There have been reports of dirt getting into the device’s hinge, damaging the screen display, of the …

News Bytes – May Read More »

Zero-day Vulnerability Discovered in Internet Explorer

Security researcher John Page has recently published information, including a proof of concept code, regarding a zero-day vulnerability in Internet Explorer that could provide hackers with a method by which they can steal files from computers that use the Windows operating system. The problem stems from the ways in which Internet Explorer handles MHT (MHTML …

Zero-day Vulnerability Discovered in Internet Explorer Read More »

Facebook Passwords Stored in Plain Text since 2012

Facebook has been mining user data for years. It logs our political stances, relationship histories and even phone records. Recent information suggests that it has been logging something else, too: unencrypted passwords. As per the recent news, hundreds of millions of passwords have been stored in plain text by Facebook-created applications. This information has been …

Facebook Passwords Stored in Plain Text since 2012 Read More »