Your daily reads on everything digital
All Categories
Research
Product Updates
Privacy
How-To
Meet the Team
Overview of TLS and SSL protocols
TLS and SSL protocols lay the foundation necessary for establishing secure and verified connections. However, without coming face-to-face…
Detection and removal of bloatware, the resource-draining apps
Bloatware describes many applications, all sharing a specific trait – they’re unnecessary. This term can include pre-installed legitimate…
Riskware turning legitimate programs into threats
Riskware, a blend of ‘risk’ and ‘software,’ defines a thin line between benign and malignant programs. Although the name signals danger, it…
Explaining the process of IP fragmentation and its flaws
IP fragmentation is a standard process of networking, designed to make the data transmissions smoother on both ends. While traversing…
A supercookie’s impact on browsing and its prevention
A supercookie might sound delicious, but it is not a treat in terms of digital privacy. For online businesses, traditional cookies are…
Three's a crowd: preventing a man-in-the-middle attack
A Man-in-the-Middle attack (MitM) is a cyber threat, with a name that perfectly defines its behavior. Between you and your final destination…
Brute force attacks can crack your passwords
A brute force attack is one of the oldest, most popular and successful hacking techniques in the cyber world. This password-cracking method…
SPI firewall for more sophisticated protection
SPI (stateful packet inspection) firewall is a sophisticated variant of the traditional firewall. It is an advanced security mechanism…
What is vishing? Defend against voice phishing attacks
Vishing or voice phishing are calls from unreliable people posing as trusted individuals or companies. The deceptive phone calls encourage…