Gmail in safari browser

What is Phishing? The Minefield in your Mailbox

They’ve been used against us for over two decades, so phishing attacks are hardly new. They have evolved, however. No longer limited to email, they can also be delivered by social media and SMS...
32 Cyber Security Terms Everyone Should Know

32 Cyber Security Terms Everyone Should Know

Cybersecurity, like most technical subjects, comes with its own set of jargon. At first, it can seem impenetrable. Here’s an easy introduction to 32 terms you should be familiar with. Cybersecurity Vocabulary Cybersecurity is the suite...

SSD vs. HDD: What’s the Difference?

If I were to be cavalier about the question posed and answered by this article, I'd simply tell you that Solid-State Drives (SSDs) are very fast, and Hard Disk Drives (HDDs) are not; though...
What is browser hijacking?

What are Browser Hijackers and How Do You Remove Them?

Browser hijackers are a type of malware designed to attack and compromise web browsers. They change your browser's settings without your permission or knowledge. Why attack browsers? Because everyone uses one. What are Browser...
FreeNAS vs UNRAID

FreeNAS vs. UnRAID: What are the Differences?

To the outside world, FreeNAS (TrueNAS) and UnRAID appear far more alike than different. In effect, they are. Both are operating systems that allow you to leverage your own hardware as a NAS (Network...
Statue of Queen Victoria

What is Punched Paper Tape, and How to Read It

To most people who can even remember what punched paper tape is, it'll seem like a relic of yesteryear. But as we'll see, that's not strictly the case. What is punched paper tape? It...
What is Thin Provisioning

What is Thin Provisioning? Use Only What You Need

No, we're not talking SlimFast here, or a forced hike on limited rations (don't ask). We're talking about yet another computer term that doesn't completely clue you in on the concept it represents. What is...
pile of vintage door keys

What Are Brute Force Attacks?

Brute-force attacks use software that generates random passwords and tries known passwords from data breaches to try to match your password. What are brute-for attacks? They're the threat actors' robot lock-pickers. What Are Brute-Force...
keyboard and world map

What is an APT and Why Should You Care?

An APT is an advanced persistent threat, usually conducted as a long-term, low-key infiltration of a network, and conducted by world-class hackers. What is an APT? It's the threat actors' man on the inside. ...

Why You Should Destroy Your Own Data

You’ve got technological defenses, robust IT governance, and a cyber-aware workforce. Your data is safeguarded, replicated, and backed up. That’s great, there's just one more thing you need to know: Why you should destroy...

Latest posts

Seagate IronWolf Pro 125 SSD

Seagate IronWolf Pro 125 SSD Review: Hard-working, Over-provisioned to the Max

When you opt for a more expensive SSD such as Seagate's new IronWolf Pro 125, you're largely paying for peace of mind. That is,...
Gmail in safari browser

What is Phishing? The Minefield in your Mailbox

They’ve been used against us for over two decades, so phishing attacks are hardly new. They have evolved, however. No longer limited to email,...
32 Cyber Security Terms Everyone Should Know

32 Cyber Security Terms Everyone Should Know

Cybersecurity, like most technical subjects, comes with its own set of jargon. At first, it can seem impenetrable. Here’s an easy introduction to 32...
Seagate IronWolf Pro 18TB

Seagate IronWolf Pro 18TB hard drive: Fast, Tons of Capacity, No Shingling

Seagate's latest entry into the spin-platters-because-they-make-storing-data-cheaper market is the rather excellent and exceedingly capacious 18TB IronWolf Pro. I once paid $700 for a 4GB...
TrueNAS R-series models

iXsystems Launches R-Series Systems and Scale-out HCI Software

iXsystems made two big announcements today with the launch of the new TrueNAS R-Series storage systems and the TrueNAS SCALE Open Source Hyper-Converged Infrastructure...