About Richard Adejumola
Richard has a certificate in Journalism from the Aileen Getty Institute of Citizen Journalism. He has been writing technical content for the web since 2017. When he's not writing, Richard reads literature or plays basketball.
What social engineering techniques would a hacker use and how would you protect yourself from them? Let's take a look at some of the most common methods of attack.
Medical institutions are a big target for hackers. Here's why, and what you can do to help protect your personal data.
Kerberos tickets verify the identities of users and servers. But hackers are also exploiting this system to find out sensitive information about you.
Looking to move your password vault from LastPass to Apple's iCloud security feature? Here's the process of switching password managers.
Amazon Prime Day is a big day for scammers, who find rich pickings in unsuspecting targets.
If you know an attack is coming, why not leave a decoy?
Numerous teams work to combat cyberattacks within a network—one of which is a blue team. So what do they actually do?
Not all hackers are bad news! Red team hackers will try to gain entry to your data, but for altruistic purposes...
Hackers are bad news, but how do they actually make money? Here are a few ways you could be targeted by cybercriminals.
Has your browsing experience changed? Is your homepage different? Are you bombarded with pop-ups? You could be a victim of a browser modifier.
You might have heard someone call any malicious software a "virus," but that isn't accurate. Different types of malware function in distinct ways.
You might be wondering if iPhones can get viruses. Here's how to scan for malware and how to remove a virus from your iPhone.
After the initial shock, there are several key steps to take.
Software is the most obvious way a hacker can target your devices, but hardware hacking can also pose a security risk.
Manufacturers use fault injections to test their products. Cybercriminals can use this method too. Here's what you need to know.
If your site runs on PHP, you might be at risk of local file intrusion attacks. But how are they carried out and what can you do about them?
Enterprise and Pro versions of Windows 10 and Windows 11 offer Credential Guard, but what does that do, and how can you enable it?