Are you looking to hide in plain sight? Here’s a rundown of three options for becoming invisible online. As concern about internet privacy grows and grows, more and more people are actively seeking to browse the web anonymously. There are various ways to avoid being identified or tracked on the internet, although, in fact, “attempt … More 3 ways to browse the web anonymously
If you have had tech connectivity issues you may have heard the IT security team say, “that’s a firewall issue”, so what is a firewall and how does it work? As its name would suggest, the term originates from a structure that prevents the spread of a fire, such as emergency fire exits. In old … More Why do IT Security experts refer to firewalls?
A domain name once left behind can catch up with you – by giving fraudsters access to a treasure trove of sensitive information. Cybercriminals can use an abandoned domain name to obtain all manner of private information belonging to the company that formerly owned the domain, as well as to its clients and employees, a researcher … More Abandoning a domain name can come back to bite you, research shows
The adoption of the protocol’s secure variant has continued its growth spurt in recent months, crossing the 50-percent milestone for the first time ever. More than one-half (51.8 percent) of the one million most visited websites worldwide now actively redirect to HTTPS, the secure version of the HTTP protocol over which data between a device … More Majority of the world’s top million websites use HTTPS
Today, we continue with our series of conversations with ESET’s security pros to hear what they have to say about the evolution of the World Wide Web since it was publicly announced 27 years ago. Next to weigh in from our lineup of experts is ESET Security Researcher Cameron Camp, who shares his thoughts mainly about … More Interviewing ESET’s experts about the Web’s journey so far – part 2