In addition to patching the actively exploited bug, the update also brings fixes for another four security loopholes. Google has rolled out an update to its Chrome web browser that fixes five security flaws, including a vulnerability that is known to be actively exploited by attackers. “Google is aware of reports that an exploit for … More Google patches Chrome zero‑day under attack
Are you looking to hide in plain sight? Here’s a rundown of three options for becoming invisible online. As concern about internet privacy grows and grows, more and more people are actively seeking to browse the web anonymously. There are various ways to avoid being identified or tracked on the internet, although, in fact, “attempt … More 3 ways to browse the web anonymously
If you have had tech connectivity issues you may have heard the IT security team say, “that’s a firewall issue”, so what is a firewall and how does it work? As its name would suggest, the term originates from a structure that prevents the spread of a fire, such as emergency fire exits. In old … More Why do IT Security experts refer to firewalls?
A domain name once left behind can catch up with you – by giving fraudsters access to a treasure trove of sensitive information. Cybercriminals can use an abandoned domain name to obtain all manner of private information belonging to the company that formerly owned the domain, as well as to its clients and employees, a researcher … More Abandoning a domain name can come back to bite you, research shows
The adoption of the protocol’s secure variant has continued its growth spurt in recent months, crossing the 50-percent milestone for the first time ever. More than one-half (51.8 percent) of the one million most visited websites worldwide now actively redirect to HTTPS, the secure version of the HTTP protocol over which data between a device … More Majority of the world’s top million websites use HTTPS