Privacy & Security
Internet security & privacy articles and tutorials on how to protect yourself from viruses, phishing emails and other scams, the latest security threats and new developments in online security,
Tips on how to use Gmail to send emails to undisclosed recipients using the BCC feature. Why send to undisclosed recipients? And when you shouldn't send to undisclosed recipients.
If you've ever used a VPN, or are concerned about online privacy, you've probably heard about "Five Eyes," "Nine Eyes," and "14 Eyes" surveillance. Just what are these eyes and why should they be important to you.
Security threats to our smart devices are endless. We look at 10 of the best security apps to protect your computers, phones and tablets.
A month after the law became enforcable hundreds of high profile websites still have not made any efforts to impliment the new law. I contacted 14 of the top companies to find out what they are doing about it, and this is what they said.
The new General Data Protection Regulation, or GDPR, is designed to protect privacy, but it looks like it could be a nightmare for webmasters whose sites have dealings with citizens of the EU.
With more and more of our lives moving online its more important than ever to be vigilant and use best online security practices. These top tips will help you stay safe online.
SSL certificates are used within web servers to encrypt the traffic between the server and client, providing extra security for users accessing your application. Let's Encrypt provides an easy way to obtain and install trusted certificates for free.
Social Engineering is something we are all exposed to every day, from watching the daily news to advertisements. Social Engineering is psychological manipulation. How can a target be manipulated to do something they normally would not do. This can be as simple as manipulating someone to use your product over another or even buy something that they don't really need, through to divulging sensitive information, such as passwords, or transferring money.
Cross-site scripting is another prevalent form of attack on a web application, and in this tutorial, we are going to find out what a cross-site scripting attack is any why they are so successful as well as how to mitigate these risks.
SQL Injection is an extremely prevalent and dangerous risk to any web application and is so easy to perform. A SQLi attack can lead to sensitive information being leaked directly from the database, malware being served, data integrity compromised and so on.