Privacy & Security
Internet security & privacy articles and tutorials on how to protect yourself from viruses, phishing emails and other scams, the latest security threats and new developments in online security,
If you've ever used a VPN, or are concerned about online privacy, you've probably heard about "Five Eyes," "Nine Eyes," and "14 Eyes" surveillance. Just what are these eyes and why should they be important to you.
Security threats to our smart devices are endless. We look at 10 of the best security apps to protect your computers, phones and tablets.
A month after the law became enforcable hundreds of high profile websites still have not made any efforts to impliment the new law. I contacted 14 of the top companies to find out what they are doing about it, and this is what they said.
The new General Data Protection Regulation, or GDPR, is designed to protect privacy, but it looks like it could be a nightmare for webmasters whose sites have dealings with citizens of the EU.
With more and more of our lives moving online its more important than ever to be vigilant and use best online security practices. These top tips will help you stay safe online.
SSL certificates are used within web servers to encrypt the traffic between the server and client, providing extra security for users accessing your application. Let's Encrypt provides an easy way to obtain and install trusted certificates for free.
Social Engineering is something we are all exposed to every day, from watching the daily news to advertisements. Social Engineering is psychological manipulation. How can a target be manipulated to do something they normally would not do. This can be as simple as manipulating someone to use your product over another or even buy something that they don't really need, through to divulging sensitive information, such as passwords, or transferring money.
Cross-site scripting is another prevalent form of attack on a web application, and in this tutorial, we are going to find out what a cross-site scripting attack is any why they are so successful as well as how to mitigate these risks.
SQL Injection is an extremely prevalent and dangerous risk to any web application and is so easy to perform. A SQLi attack can lead to sensitive information being leaked directly from the database, malware being served, data integrity compromised and so on.
Parameter tampering is a method by which malicious hackers attempt to compromise your application through manipulating parameters in the URL string. This can cause applications to perform in ways the programmer did not intend, especially if invalid data is encountered.