Your IP: Unknown · Your Status: ProtectedUnprotectedUnknown

Vulnerabilities

Hackers are always ready to exploit vulnerabilities. That app you forgot to update, the password you never got around to changing — it only takes one weak link for a cybercriminal to break through. Find out how to identify and fix vulnerabilities before someone else finds them.

May 10, 2022

7 min read

Is my phone listening to me?

Karolis Bareckas

Karolis Bareckas

Apr 06, 2022

3 min read

Google Chrome Zero-day 2022

Charles Whitmore

Charles Whitmore

Feb 04, 2022

3 min read

What is Log4Shell and what kind of damage can it do?

Karolis Bareckas

Karolis Bareckas

Jan 11, 2022

5 min read

What is Structured Query Language (SQL) injection?

Malcolm Higgins

Malcolm Higgins

Oct 01, 2021

3 min read

Is jailbreaking safe for your iPhone?

Daniel Markuson

Daniel Markuson

Aug 11, 2021

3 min read

Not-a-Virus: What is it?

Zen Bahar

Zen Bahar

Aug 10, 2021

3 min read

Why does Apple want to backdoor users’ iPhones?

Daniel Markuson

Daniel Markuson

May 11, 2021

4 min read

What is zero day?

Sibilė Šimkevičiūtė

Sibilė Šimkevičiūtė

Jan 02, 2021

4 min read

URL Spoofing: Definition and explanation

Jomilė Nakutavičiūtė

Jomilė Nakutavičiūtė

Aug 10, 2020

5 min read

How safe is Office 365 security?

Malcolm Higgins

Malcolm Higgins

Jun 11, 2020

3 min read

5G security: is there any reason to worry?

Karolis Bareckas

Karolis Bareckas