Articles by Penny
In this article, we’ll be looking at how to wipe and secure external hard drives. Read on to find out more about why you might need to wipe your device and how to do it.
By Penny Hoelscher
in Information Security
on February 17, 2022
Looking to improve your security by encrypting your files or even your hard drives in Windows? We will walk you through every step so you can keep all of your sensitive data safe.
By Penny Hoelscher
in VPN & Privacy
on November 13, 2023
Becoming a Certified Ethical Hacker (CEH) can be a smart career move and can be incredibly lucrative. Find out how to learn ethical hacking and the best online courses available.
By Penny Hoelscher
in Information Security
on January 8, 2024
We explain what virus hoaxes are, how they work and how you can recognize them. We'll also give you
By Penny Hoelscher
in Antivirus
on August 18, 2020
Learn what a relay attack is, how it works, and how it can be prevented. By way of illustration, we will look at three examples of relay attacks. Car relay attacks, particularly, show the varied techniques criminals use to get into, and away with, your car.
By Penny Hoelscher
in Information Security
on August 3, 2023
Is the negative hype about Shodan – sometimes likened to George Orwell's Big Brother and labeled "the scariest search engine on the internet" – justified, or will this creepy crawler prove to be the most effective solution for protecting IoT devices against cyber attack?
By Penny Hoelscher
in VPN & Privacy
on August 4, 2023
We will explain what AES and TKIP are and suggest which option you should choose for your WPA2-supported devices. Choosing the best encryption mode is important for both security and the speeds on your device.
By Penny Hoelscher
in Information Security
on August 24, 2023
WPA3 is the latest certification program released by the Wi-Fi Alliance. Find out why it became necessary and where you might expect to use it.
By Penny Hoelscher
in Information Security
on October 19, 2023
Here we give you the lowdown on the most interesting companies at Infosec Europe 2018. Infosecurity
By Penny Hoelscher
in Information Security
on August 3, 2023