About Richard Adejumola
Richard has a certificate in Journalism from the Aileen Getty Institute of Citizen Journalism. He has been writing technical content for the web since 2017. When he's not writing, Richard reads literature or plays basketball.
How to Protect Yourself From These 8 Social Engineering Attacks
What social engineering techniques would a hacker use and how would you protect yourself from them? Let's take a look at some of the most common methods of attack.
Cyberattacks on Healthcare: How They Happen and What You Can Do to Protect Your Data
Medical institutions are a big target for hackers. Here's why, and what you can do to help protect your personal data.
Hacking the Las Vegas MSG Sphere: Is It Possible?
The world is watching the MSG Sphere on the Las Vegas Strip, but could hackers have their eyes on the giant globe too? How might it be hacked?
What Is Kerberoasting, and Should You Be Worried About It?
Kerberos tickets verify the identities of users and servers. But hackers are also exploiting this system to find out sensitive information about you.
How to Switch From LastPass to iCloud Password Manager
Looking to move your password vault from LastPass to Apple's iCloud security feature? Here's the process of switching password managers.
Common Amazon Scams That Happen on and After Prime Day
Amazon Prime Day is a big day for scammers, who find rich pickings in unsuspecting targets.
What Is Deception Technology and How Does It Work?
If you know an attack is coming, why not leave a decoy?
What Is Blue Teaming and How Does It Improve Cybersecurity?
Numerous teams work to combat cyberattacks within a network—one of which is a blue team. So what do they actually do?
What Is Red Teaming and How Does It Improve Cybersecurity?
Not all hackers are bad news! Red team hackers will try to gain entry to your data, but for altruistic purposes...
The Hacking Business Model: How Attackers Bag $20 Million Per Month
Hackers are bad news, but how do they actually make money? Here are a few ways you could be targeted by cybercriminals.
What Are Browser Modifiers and Should You Be Worried About Them?
Has your browsing experience changed? Is your homepage different? Are you bombarded with pop-ups? You could be a victim of a browser modifier.
What Is the Difference Between a Worm, a Trojan, and a Virus?
You might have heard someone call any malicious software a "virus," but that isn't accurate. Different types of malware function in distinct ways.
Can You Get Malware on an iPhone? Here's How to Check
You might be wondering if iPhones can get viruses. Here's how to scan for malware and how to remove a virus from your iPhone.
Security Chips Explained: What You Need to Know
Few of us know that our devices are fitted with security chips, so what do they actually do? How do they keep you safe?
What to Do After Your Car Has Been Stolen (and What to Do if It's Recovered!)
After the initial shock, there are several key steps to take.
What Is Hardware Hacking and Should You Be Worried?
Software is the most obvious way a hacker can target your devices, but hardware hacking can also pose a security risk.
What Is a Fault Injection Attack (FIA)? Should You Be Worried?
Manufacturers use fault injections to test their products. Cybercriminals can use this method too. Here's what you need to know.
What Are Local File Intrusion (LFI) Attacks and Should You Be Worried?
If your site runs on PHP, you might be at risk of local file intrusion attacks. But how are they carried out and what can you do about them?
What Is Windows Credential Guard, and Should You Use It?
Enterprise and Pro versions of Windows 10 and Windows 11 offer Credential Guard, but what does that do, and how can you enable it?
What Is GrapheneOS and Is it Better for Your Privacy?
GrapheneOS is a custom version of Android that claims to prioritize your privacy and security. But does it? Should you switch to GrapheneOS?