Other
Latest Posts from Our Blog
You may have come across the word encryption recently in the news. It’s becoming a bit of a hot topic in the media as more and more eyes shift to covering the ever expanding world of computer crime. Governments are focusing on it to try and gain the ability to decrypt files when necessary, and…
Read MoreFacebook, like Google, is a website with many interesting and relevant features that a large portion of the world’s population find useful. This is evidenced by Facebook.com being the third-most visited website on the Internet according to Alexa (behind Google.com and YouTube.com). This level of usage puts Facebook in a similar position as Google for…
Read MoreEven with the added layer of security of Two-Factor Authentication (2FA), cybercriminals are still finding ways to hack into accounts. How are they doing this? By basically taking control of a phone number, they are having the 2FA messages sent to a device on the phone number that they now control, thus getting around the…
Read MoreA browser cookie is data sent from a website that will be stored on your computer. Typically, these cookies store data such as cart information on shopping websites, login information when you choose to “Remember Me” while logging in to a website, tracking activity across websites, storing customized settings for websites, and potentially other data…
Read MoreA Denial of Service (DoS) attack is an attack on an individual computer or network that aims to consume as many resources as possible. The main goal of this attack is to deny service to the legitimate users of the computer or network. There are a number of ways in which this can be accomplished,…
Read More