Information Security
Comparitech breaks down the concepts behind encryption, explaining the most common algorithms, security protocols and their uses.
By Josh Lake in Information Security on September 29, 2023
Interested in learning more about RSA encryption? We explain how RSA encryption was developed, how it works and the biggest security issues involved.
By Josh Lake in Information Security on March 5, 2024
Phishing scams are common place, here's how to recognize and avoid them.
By Dave Albaugh in Information Security on May 13, 2022
Pretty Good Privacy (PGP) is an encryption program that provides a free way to secure online communications. Find out how to use it in our step-by-step guide.
By Josh Lake in Information Security on November 16, 2023
Are you looking for a full disk encryption tool you can trust for Mac or Windows? We recommend six disk encryption tools.
By Paul Bischoff in Information Security on October 2, 2023
A new UK TV licensing scam targets British TV owners with phishing emails that threaten to terminate
By Paul Bischoff in Information Security on March 15, 2022
Learn how to set up PGP encryption in Outlook's desktop app in just a few minutes. Send and receive encrypted emails in Outlook.
By Josh Lake in Information Security on June 8, 2023
Find out why you should use PGP encryption with Gmail and how to configure the different available options.
By Josh Lake in Information Security on September 1, 2023
PGP encryption is useful for securing everything from emails to hard drives. But what exactly is it, and how does it work? We find out.
By Josh Lake in Information Security on November 16, 2023
Page 36 of 47