Skip to content

The Learning Center

A phone and laptop displaying emails unread

What Is Email Spoofing – And How Does It Work?

Cyber criminals and spammers use email spoofing to trick email recipients into believing that they have received a message from someone they know or an account they trust.  To commit an email spoofing attack, the attacker forges a fake email header, which then displays a familiar (but fraudulent!) name to the recipient.  Because most people…

[Read More]
A hacker working in high speed computer

What Is XSS?

The threat of a cyber attack can strike terror in the hearts of anyone who spends time online. From hacks against individuals like phishing schemes or evil twinning, to large scale cyber attacks such as malware and ransomware, it seems like malevolent hackers lurk in every corner of the Internet.   The good news is that…

[Read More]
John Pizzuro talks about protecting kids from online predators.

Protecting Kids from Online Predators: A Mutli-Factor Approach

As the world does more and more online and our kids are ever more connected, protecting kids from predators while they’re online becomes a major concern. Many kids are already addicted to devices, which can make them vulnerable to being preyed upon. The best approach to protecting kids from online predators is two-sided. Legislation to…

[Read More]
An image displaying a close-up of a web input for a login and password

What SQL Injection Is & How It Works

SQL injection is a mechanism that cyber attackers use to interfere with application queries to a database. Specifically, SQL injection exploits a security vulnerability and gives hackers access to data that they shouldn’t have access to. How SQL Injection Works To understand SQL injection (SQLi), you have to first understand code injection and SQL. “Code…

[Read More]
A person holding a clamshell mobile phone.

What Is Wireless Application Protocol (WAP)?

Wireless Application Protocol (WAP) is a packet-switching protocol that was designed for micro-browsers. Most mobile wireless networks and mobile phones from 1999-2010 used WAP to access the Internet.  For years, WAP provided the framework so that wireless devices can communicate instantly between themselves and the Internet. Today, WAP is essentially obsolete, as modern mobile browsers…

[Read More]
Paul Valente talks about using artificial intelligence in cybersecurity and the importance of transparency.

Using Artificial Intelligence in Cybersecurity to Assess Risks

Artificial intelligence technology is growing and evolving rapidly. That presents challenges. With generative AI creating text and images that can be almost indistinguishable from the real thing, misinformation, disinformation, and outright fakes are harder to spot. And it provides tools that hackers and scammers can use to defraud you. But artificial intelligence also provides opportunities.…

[Read More]
A woman paying online using her credit card

What Is Personally Identifiable Information (PII)?

Personally Identifiable Information (PII) is an important concept in privacy laws and online security.  Put simply, PII is any information that can be used to identify an individual. PII can be one piece of information that identifies a person, or it could be information that must be combined with other relevant data to successfully identify…

[Read More]

What are the benefits of SOCKS5 proxy?

The world of technology is full of tools to help protect your online security. At times, the plethora of tools available may seem overwhelming. However, whether you’re protecting your professional or personal online presence, understanding the privacy options you have is paramount. One option at your disposal is SOCKS5 proxy. It sounds super technical and…

[Read More]