
Security
SecurityHow to protect your privacy when selling your phone
If your current phone is ready for retirement or you need to sell your current phone to upgrade to a new model, follow these steps to keep your data private.
You're on page 120, See the latest articles on Security.
If your current phone is ready for retirement or you need to sell your current phone to upgrade to a new model, follow these steps to keep your data private.
We'll guide you through the process of using Homebrew package manager to install security tools on macOS to perform reconnaissance, discovery, and fingerprinting of the devices on your network.
Learn how to use Apple's Privacy Report in Safari so you can see which websites attempted to track you on your iPhone or iPad.
To create a log or not to create a log, that is the question.
If you've had files deleted by a hacker or you've accidentally removed them, Jack Wallen shows you how to recover that missing data with a handy tool called testdisk.
Remote work makes protecting data on the PC a higher priority, while the Edge browser gets more control.
VMware's NSX hypervisor provides a platform to manage virtualized network deployments. Learn more about the network virtualization platform in this resource guide.
Cyberattacks have surged during the coronavirus pandemic. This infographic details ransomware attack trends by industry, continent, and more.
Bad actors use machine learning to break passwords more quickly and build malware that knows how to hide, experts warn.
Wi-Fi networks in hotels typically favor guest convenience over strong security practices, says the FBI.
The Graylog Inputs window is where you add new clients.
Graylog makes it easy to send syslog information from clients to the hosting server. Jack Wallen shows you how.
We'll guide you through the process of using Homebrew package manager to install common security tools on macOS computers to assess and aid in hardening devices on your network.
Logging in to GoPhish for the first time.
Jack Wallen shows you how to run a phishing simulation on your employees to test their understanding of how this type of attack works.
The installed app listing with the Android 11 Permission Manager.
With your Android device upgraded to version 11, you'll want to get control of app permissions. Jack Wallen shows you how.
Android 11 is finally released, and there are security and privacy fixes and features you should know about Google's mobile operating system. Jack Wallen provides the details.
Almost anything with an internet connection can be hijacked and used in a malicious botnet attack--IoT devices are especially popular targets. Learn how to spot and prevent this malware threat.