Skip to Main Content

Man-in-the-middle (MITM) attacks

When you share confidential information face-to-face with others, you’re probably careful not to let others hear — perhaps even whispering so nobody can eavesdrop on your conversation. Taking precautions also applies to the virtual world, especially as we’re learning every day about the increasing threats of cyberattacks that can affect each and every one of

You probably know someone who’s been the victim of an attempted scam, where some fraudster tries to obtain sensitive information using a false identity or something similar. Cybercriminals also use this centuries-old “tradition” of deception, where they pretend to be someone we know or a reputable company to gain access to confidential data or to

The darknet — truly the dark side of the internet?

Many associate the darknet with the digital black market for everything that can only be obtained illegally: Drugs, weapons, viruses and malware, contract killers, poison, credit card numbers, all kinds of sensitive data, and so on. The darknet is situated on the dark side of the internet — after all, it’s also a synonym for

Why aren’t there virus scanners for iPhones?

It seems that not a day goes by without seeing a warning about security flaws, malware, Trojans, ransomware, phishing attacks, viruses, or some other digital threat. And seemingly, it’s only Windows or Android users who are affected — users of Apple products, such as Mac, iPad, or iPhone, rarely get affected if at all. Could

We’ve all had a lot to worry about in...

With the increasing popularity of online services such as...

When browsing the web, it seems all too easy...

With the UK slowly opening back up again there’s...