Month in security with Tony Anscombe – November 2024 edition Security Zero days under attack, a new advisory from ‘Five Eyes’,… rooter February 17, 2025 1 min read 0
Philip Torr: AI to the people | Starmus highlights Security We’re on the cusp of a technological revolution that is… rooter February 17, 2025 1 min read 0
Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks Security Buying a pre-owned phone doesn’t have to mean compromising your… rooter February 17, 2025 1 min read 0
How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8) Security As cybersecurity is a make-or-break proposition for businesses of all… rooter February 17, 2025 1 min read 0
ESET Threat Report H2 2024 Security A view of the H2 2024 threat landscape as seen… rooter February 17, 2025 1 min read 0
Weekly Update 439 Security Presently sponsored by: 1Password Extended Access Management: Secure every sign-in… rooter February 16, 2025 2 min read 0
Friday Squid Blogging: Squid the Care Dog Security The Vanderbilt University Medical Center has a pediatric care dog… rooter February 14, 2025 1 min read 0
Disabling Directory Listing on Your Web Server – And Why It Matters Security By default, some web servers allow directory listing, which means… rooter February 14, 2025 1 min read 0
Strengthen Your Web Applications with HTTP Security Headers Security What is a HTTP security header? An HTTP security header… rooter February 14, 2025 1 min read 0
Understanding Injection Attacks in Application Security: Types, Tools, and Examples Security How Injection Attacks Exploit Web Application Vulnerabilities Injection attacks occur… rooter February 14, 2025 1 min read 0