Keeping your personal and online data private and secure is paramount. You’ll learn how to stay safe online with the best firewall and anti-virus software, how to manage your passwords and how to recognise scams and security risks.
It's happened again. Like a dodgy employee with their hand caught in the till and…
Should you secure your phone with a fingerprint or a PIN? No one is likely to guess your fingerprint, but is it really more secure? Could a PIN be more secure?
Like the real world, the internet can sometimes be a scary place for your kids. There are some great apps and tools to keep them safe; here are some we think are the best.
Reports that a massive leak of webmail accounts includes a huge number of credentials never…
Vishing and smishing are dangerous new phishing variants. What should you be looking out for? How will you know a vishing or smishing attempt when it arrives? And are you likely to be a target?
How would you feel if a retail tracked your smartphone as you browsed their store? Would it be easier to palate if they offered you some discounts while breaching your privacy?
Apple hardware is no longer a safe haven from hackers, malware, ransomware, and other cyber-threats. The first half of 2016 proves that without the right precautions, your devices can become risks….
The so-called end-to-end encryption protocol promises that “only you and the person you’re communicating with can read what is sent.” No one, not even WhatsApp, has access to your content.
Security researchers at the University of Michigan have uncovered a number of design flaws in Samsung’s SmartThings platform. The flaws potentially undermine the security of any smart home setups using the SmartThings ecosystem.
Planning on recording phone calls? It’s relatively easy, but is it legal? It’s best to check your local laws for specific regulations, as they can differ from state to state, country to country.
The deep web and the dark web both sound scary and nefarious, but the dangers have been overblown. Here’s what they actually and how you can even access them yourself!
The accounts of more than 7 million members of Lifeboat were compromised earlier in the year, and the data has reportedly been sold to the highest bidders on the Dark Net.
Yyou’ve probably heard the phrase “brute force attack.” But what, exactly, does that mean? How does it work? And how can you protect yourself against it? Here’s what you need to know.
You’ve seen the Windows tech support scam on YouTube; you’ve had some calls yourself. But is it a good idea to record these calls, or simply hang up and move on with life?
A new ransomware variant, Petya, has been cracked by an irate victim. This is a chance to get one over on the cybercriminals, as we show you how to unlock your ransomed data.
he latest Spotify leak might be the strangest one yet. Hundreds of accounts have been splashed on PasteBin. So, what’s really going on?
WhatsApp recently announced that they would be enabling end-to-end encryption in their service. But what does this mean for you? Here’s what you need to know about WhatsApp encryption.
Finding a random USB drive laying around might arouse your curiosity, but STOP before you do anything rash. This one mistake could cause you a lot of pain and regret.
If the Windows Tech Support calls you out of the blue, know that it’s a scam. But what should you do? Hang up, lead the callers on, or report them? Let’s find out.
The leak of what was named the “Panama Papers” has proven what many assumed: that our leaders have been bending the rules to line their pockets. But could a similar leak affect you?
Just because you’ve installed a safety net in parental control software doesn’t mean your children won’t find a way to navigate through it. Here’s how they’ll do it!
Aren’t USB flash drives redundant? We don’t think so. There are many ways in which a USB drive can still come in handy, including keeping your computer secure. Here’s how.
A recent study showed that the convenience of URL shorteners like bit.ly and goo.gl could come with a significant risk to your security. Is it time to quit URL shortener tools?
Is your fitness tracker secure? A technical report highlighted a series of serious security flaws in their designs, theoretically allowing potential attackers to intercept your personal data. What are the risks?