The 5 Pillars of IT Security (according to the NHS)
The UK government has announced 5 ways they plan to improve IT security in the National Health Service
What Is a Root Certificate? Differences Between Root and Intermediate Certificates
Root, intermediate and SSL certificates — oh, my! These are terms you may have heard while browsing online. But what is a root certificate, and…
Western Digital hit by hackers
Western Digital refuses to cooperate, which is giving momentum to the news nearly one month after it happened.
Cybersecurity for Kids: 7 Tips for Teaching the Basics
Reducing the gender gap in technology fields starts with teaching young kids. We have 10 cybersecurity lessons for kids that will encourage smart tech use.
Macbook Security: Do I Need Antivirus for Macbook?
Apple products are protected by an array of built-in security features, but they’re not impenetrable. No one wants to be blindsided by a virus or…
Does my local police station use face recognition?
Facial recognition is being used by law enforcement departments across the USA. It raises security and privacy concerns.
Are public USB charging stations to be trusted?
Hackers are infecting USB charging stations in high-foot-traffic spaces with malware -they call it juice jacking. Here is how to avoid it.