UK-based adult websites urged to do more to protect children
UK watchdog claims that porn site operators are not doing enough to protect children from accessing inappropriate content
What Is an IP Address? Accessing and Protecting Your Device’s Identity
Have you ever wondered how the message you send on your cell phone makes its way to your friend’s computer? While we may not consider…
What is Hacktivism?: Its Motivations, Types, and Prevention
Hacktivism refers to cyber-activism, or the act of breaking into a computer system to wage an information war for political, social, religious, or anarchistic reasons.…
UK data watchdog warns against paying ransomware demands
The Information Commissioner’s Office has written to the Law Society urging lawyers to stop recommending ransomware payments
Cryptocurrency, a new haven for money laundering
Cybercriminals take advantage of the untraceability of cryptocurrencies to launder the proceeds of their online scams.
Vulnerability Assessment: What it is and How to Perform One
Quick answer: A vulnerability assessment reviews and assesses the risks of security weaknesses in an organization’s information and security systems. There are more than 180,000…
What is SSL? A Guide to How It Works and Why It’s Important
Secure Sockets Layer, otherwise known as SSL, is an encryption protocol that creates an authenticated channel between devices on the internet, so that information can…