On January 28, 1981, the Council of Europe’s data protection convention, known as “Convention 108,” was opened to signature. Convention 108, which continues to be updated as the digital world evolves,…
As the wealth of cybercrime intelligence published by cybersecurity researchers increases every year, there is a parallel risk that this can become potentially unmanageable for IT administrators who…
As concern about internet privacy grows, more and more people are actively seeking to browse the web anonymously. There are various ways to avoid being identified or tracked on the internet, although,…
In the early days of the internet, it was quite common for local networks to run their own domain name service (DNS). DNS was invented as a solution for allowing internet users to query remote servers…
On October 22, 2009, Microsoft released Windows 7, an operating system that would turn out to be a big hit among users, remaining highly popular throughout the entirety of the past decade. However,…
For many, the holiday season is the most magical time of the year, but unfortunately it can also be high season for cyber criminals to strike. For this festive season, we’ve compiled a guide to some…