News

Having to complete multiple identity checks during online sessions prompts a discussion of the socially constructed notion of ...
Use a strong password.” And you should. However, if there’s one thing I’ve learned from studying penetration testing and ethical hacking, it’s this: a strong password is just one layer. By itself, it ...
Google's Threat Intelligence Group (GTIG) says attackers exploited 75 zero-day vulnerabilities in the wild last year, over 50 ...
The rise of professional cyber crime groups and state-sponsored actors targeting critical infrastructure requires a move ...