• Your Digital Life
  • Tech Explained
  • Work Hub
Português (BR) Français
  • Your Digital Life
  • Tech Explained
  • Work Hub
Português (BR) Français English (U.S)

How does a man-in-the-middle attack work? Former ethical hacker Jason Hart explains

A man-in-the-middle attack is where a hacker inserts him or herself into a conversation between two parties. In the case of a cyber security attack that could affect you, this would be your PC or […]

Definitions | Man-the-middle-attack | Security

How does a phishing scam work? Former ethical hacker Jason Hart explains

Phishing scams are designed to trick you into revealing your usernames and passwords. The most common way this data is obtained is by: you clicking a link you believe to be genuine that ends up […]

Definitions | Phishing | Security

What is ‘catfishing’ and how to avoid it

For those who are unsure, in this post we explore what a ‘catfish’ is and provide tips on how to avoid it.

Catfish | Catfishing | Scams

What is BlueKeep and how can I protect myself?

As the National Security Agency issues a warning about BlueKeep vulnerability for Windows users we determine what the vulnerability is and how you can protect yourself against it

Browsing | Communications | Data Breach

What is ethical hacking?

Today’s news is often riddled with coverage of new cyber-attacks. Traditional crime is moving online and large-scale hacks such as those experienced by Equifax and Yahoo have awakened firms to the need to radically improve […]

Communication | Cybersecurity | Data Breach

Top tips for speeding up your computer

As society looks towards AI and robotics to increase our productivity and assist our everyday working and social life, experiencing a slow computer can appear to be something that shouldn’t happen anymore. Yet, this is […]

Browsing | How-to | Security

Tech trends 2017: cybersecurity

It was revealed in December that Yahoo had fallen victim to another hack, jeopardizing the security of over 1 billion accounts. Sadly, cyber-attacks are becoming more common, which means it’s vital to protect yourself online. […]

Communications | Cybersecurity | Hack

How to spot scams on LinkedIn

28.11.22 LinkedIn is a social network owned by Microsoft, designed for networking and professional communications. There are currently around 830 million users, and over 50 million people are looking for jobs every week on the […]

Cyber Scams | LinkedIn | Scam

How can I avoid falling for a holiday rental scam?

Published: 2 August, 2022 It’s an awful feeling if your holiday rental turns into a nightmare, particularly when it’s a special event or a long-awaited holiday. One of the most common holiday scams is tricking […]

AirBnB | Data Protection | Holiday

How can I avoid a (holiday) phishing scam?

Published: 27 July, 2022 Summer holiday season is upon us…but be warned as scammers use this time of year to take advantage. In this article we will be providing tips on how to prevent this […]

Cybersecurity | Digital | Malware
Load More

Trending Posts

  • 10 Online Scams to Watch Out for This Christmas
  • What is Mastodon and how does it work?
  • How to make your browser more secure

What is a Mobile Driver's License?


  • ACTIVITIES
  • Defence & Security
  • Digital Identity and Security
  • Aerospace
  • Space
  • Ground Transportation
  • Market-specific solutions
  • GLOBAL
  • Career
  • Investor
  • Journalist
  • Customer Online
  • SOCIAL NETWORKS
  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
  • Youtube
  • ASK THALES
  • Your Digital Life
  • Tech Explained
  • Work Hub
  • LINKS
  • About This Site
  • Terms & Conditions
  • Privacy
Decisive technology for decisive moments
www.thalesgroup.com