Last Updated on 3 October 2023 by Daniel We have updated our licensing model. We are now open source. No plans. You can now get Password Sentry for FREE. However, we do charge a fee of $24.95 (USD) for our techs to install / reinstall / upgrade via Jobber app in Client Area. Password Sentry… Continue reading Password Sentry Licensing Update
Last Updated on 3 September 2023 by Daniel Kevin Hearty, Queen’s University Belfast Data breaches are not a good look for any institution or organisation. But depending on the nature of the data leaked and the organisation, some breaches can be more serious and have greater consequences than others. This is certainly true of the… Continue reading The personal details of Northern Ireland’s main police force have been leaked – three reasons why that’s incredibly dangerous
The Dark Web refers to the encrypted and hidden part of the internet that cannot be accessed through standard search engines or web browsers. It is a subset of the Deep Web, which includes any web content that is not indexed by traditional search engines. The Dark Web is known for its anonymity and lack… Continue reading What is the Dark Web, and How Can We Combat It?
Last Updated on 13 July 2023 by Daniel Form-based authentication and basic authentication are two different methods of user authentication, each with its own advantages and considerations in terms of security. Basic authentication involves sending the username and password in plaintext with each request. This information is encoded using Base64 encoding but is not encrypted.… Continue reading Is Form-Based Authentication More Secure Than Basic Authentication
Last Updated on 12 June 2023 by Daniel To make a web form more secure, you can follow these best practices: By implementing these security measures, you can significantly enhance the security of your web form and protect user data from potential threats.
Last Updated on 19 April 2023 by Daniel 1. Introduction SQL injection is a type of attack that allows an attacker to execute malicious SQL code on a database. This code can be used to view, modify, or delete data from the database. SQL injection attacks are a serious threat to any website that relies… Continue reading How To Secure Your Website Against SQL Injection Attacks
Last Updated on 2 April 2023 by Daniel It is one of China’s most popular shopping apps, selling clothing, groceries and just about everything else under the sun to more than 750 million users a month. But according to cybersecurity researchers, it can also bypass users’ cell phone security to monitor activities on other apps,… Continue reading CNN :: ‘I’ve never seen anything like this:’ One of China’s most popular apps has the ability to spy on its users, say experts
Last Updated on 6 February 2023 by Daniel Cassandra Cross, Queensland University of Technology Reports of data breaches are an increasingly common occurrence. In recent weeks, Ticketmaster, HealthEngine, PageUp and the Tasmanian Electoral Commission have all reported breaches. It is easy to tune out to what is happening, particularly if it’s not your fault it… Continue reading Another day, another data breach – what to do when it happens to you
Thomas Reisinger, De Montfort University The video conferencing app Zoom gained about 2 million new users in the first two months of 2020 – and that was before the World Health Organization declared the coronavirus outbreak a pandemic. With so many people now relying on video conferencing for contact with their friends, family and colleagues,… Continue reading Zoom security: I’ve researched problems with video conferencing for years – here’s what you need to know
Paul Haskell-Dowland, Edith Cowan University and Steven Furnell, University of Nottingham Sometimes it seems like passwords have been with us forever, and yet every year we’re reminded how we still don’t use them properly! The annual publication of the “worst passwords” list shows we haven’t become much more password savvy over the decade. And while… Continue reading Apple’s PassKeys update could make traditional passwords obsolete