About Richard Adejumola
Richard has a certificate in Journalism from the Aileen Getty Institute of Citizen Journalism. He has been writing technical content for the web since 2017. When he's not writing, Richard enjoys reading, playing pickup, or NBA2K.
How to Switch From LastPass to iCloud Password Manager
Looking to move your password vault from LastPass to Apple's iCloud security feature? Here's the process of switching password managers.
Common Amazon Scams That Happen on and After Prime Day
Amazon Prime Day is a big day for scammers, who find rich pickings in unsuspecting targets.
What Is Deception Technology and How Does It Work?
If you know an attack is coming, why not leave a decoy?
What Is Blue Teaming and How Does It Improve Cybersecurity?
Numerous teams work to combat cyberattacks within a network—one of which is a blue team. So what do they actually do?
What Is Red Teaming and How Does It Improve Cybersecurity?
Not all hackers are bad news! Red team hackers will try to gain entry to your data, but for altruistic purposes...
The Hacking Business Model: How Attackers Bag $20 Million Per Month
Hackers are bad news, but how do they actually make money? Here are a few ways you could be targeted by cybercriminals.
What Are Browser Modifiers and Should You Be Worried About Them?
Has your browsing experience changed? Is your homepage different? Are you bombarded with pop-ups? You could be a victim of a browser modifier.
What Is the Difference Between a Worm, a Trojan, and a Virus?
You might have heard someone call any malicious software a "virus," but that isn't accurate. Different types of malware function in distinct ways.
Can You Get Malware on an iPhone? Here's How to Check
You might be wondering if iPhones can get viruses. Here's how to scan for malware and how to remove a virus from your iPhone.
Security Chips Explained: What You Need to Know
Few of us know that our devices are fitted with security chips, so what do they actually do? How do they keep you safe?
What to Do After Your Car Has Been Stolen (and What to Do if It's Recovered!)
After the initial shock, there are several key steps to take.
What Is Hardware Hacking and Should You Be Worried?
Software is the most obvious way a hacker can target your devices, but hardware hacking can also pose a security risk.
What Is a Fault Injection Attack (FIA)? Should You Be Worried?
Manufacturers use fault injections to test their products. Cybercriminals can use this method too. Here's what you need to know.
What Are Local File Intrusion (LFI) Attacks and Should You Be Worried?
If your site runs on PHP, you might be at risk of local file intrusion attacks. But how are they carried out and what can you do about them?
What Is Windows Credential Guard, and Should You Use It?
Enterprise and Pro versions of Windows 10 and Windows 11 offer Credential Guard, but what does that do, and how can you enable it?
What Is GrapheneOS and Is it Better for Your Privacy?
GrapheneOS is a custom version of Android that claims to prioritize your privacy and security. But does it? Should you switch to GrapheneOS?
What Is Credential Stealing? How to Prevent It on Windows
Credential stealing can leave you completely exposed, so wat actually is it? What can you do about it? Here's what you need to know.
What Is a Living-Off-the-Land Attack and How Can You Prevent It?
Cybercriminals don't need to install malware onto your system to attack you. They could silently use already existing programs to take control.
How to Find and Remove WMI Persistence Malware From a Windows PC
WMI persistence malware can hide on your computer in plain sight. Fortunately, it's easy to get rid of it from a Windows PC.
What Is a Telephony Denial of Service (TDoS) Attack?
You've likely heard about Denial of Service attacks. But this variant can cripple infrastructure and cost lives. Here's what you need to know.