Stephen ParsonsApr 18, 20234 minEvide hack shows how we must take third-party security management more seriouslyThis week, another hack effecting vulnerable end users in Ireland and the UK will have caused a great deal of stress and anxiety for the...
Stephen ParsonsDec 12, 20221 minHow to create secure passwordsA secure password is typically one that is long, random, and complex. Here are some tips for creating a secure password: Use a mix of...
Rachel HanlonOct 19, 20211 minA Harvester Group targeting Telcos, government&IT sector has been discovered by security researchersDescription Harvester group is targeting telecommunications, government, and information technology sectors by using custom backdoor to...
Megan HaybyrneSep 14, 20211 minHow do Cyber Attacks Work?Cyberattacks can differ in many ways such as type of attack, size and results. However, there is a basic structure that cyber criminals...
Megan HaybyrneSep 2, 20211 minChrome researcher declare Chrome 93 as a stable channel by fixing 27 important vulnerabilities.Description Chrome team announced chrome 93 as a stable channel for Windows, Mac and Linux with fixing multiple high severity...
Stephen ParsonsJun 22, 20212 minAre you prepared for how fast a password leaked on the web will be tested out by hackersIn an interesting article published this month by ZDnet, the speed at which compromised accounts get tested by hackers was proven to be...