Menu
Close
Search
Search
English
EN
Italian
it
French
fr
German
de
Spanish
es
VPN
By Use
Best VPNs of 2024
Business VPN
Netflix
Kodi
Torrenting
Hulu
Sky Go
Gaming
BBC iPlayer
Tor
By OS/Device
Mac
Windows
Linux
Windows 10
Firestick
iPhone and iPad
Android
Windows Phone
DD-WRT Routers
By Country
All VPN Country Guides
China
Japan
US
UK
Canada
Australia
Germany
France
UAE & Dubai
Guides
Fastest VPNs
Cheapest VPNs
Free VPNs
How to access the deep web
Is torrenting safe and legal?
Build your own VPN
Facebook privacy and security
How to encrypt email
How to stay anonymous online
How we test VPNs
Reviews
NordVPN
Surfshark
ExpressVPN
IPVanish
PrivateVPN
StrongVPN
CyberGhost
PureVPN
See all
Antivirus
Reviews
Norton Antivirus
TotalAV
Intego VirusBarrier X9
McAfee
VIPRE
Panda Security
Eset
See all
By OS/Device
Mac
Windows
Linux
Android
iPhone
Guides
Best Antivirus in 2024
Best Free Firewalls
Free Antivirus Software
Malware Statistics & Facts
Compare providers
McAfee vs Kaspersky
Norton vs Kaspersky
McAfee vs Norton
Online backup
Streaming
Streaming Hub
Kodi
Plex
Sports Streaming
TV Streaming
IPTV
Blog
VPN & Privacy
Cloud and Online Backup
Information Security
More Comparisons
Password Managers
Identity Theft Protection
Usenet
Privacy & Security Tools
Internet Providers
Parental Control Software
Net Admin Tools
Data Privacy Management
Data Recovery Software
Crypto
Utilities
News
About Us
About Our Company
Press
Software Testing Methodology
Editorial Process
Careers at Comparitech
Contact
Blog
Information Security
Information Security
Common encryption types explained: A guide to protocols and algorithms
Comparitech breaks down the concepts behind encryption, explaining the most common algorithms, security protocols and their uses.
By
Josh Lake
in
Information Security
on September 29, 2023
Exploring RSA encryption: a comprehensive guide to how it works
Interested in learning more about RSA encryption? We explain how RSA encryption was developed, how it works and the biggest security issues involved.
By
Josh Lake
in
Information Security
on March 5, 2024
Common phishing scams and how to recognise and avoid them
Phishing scams are common place, here's how to recognize and avoid them.
By
Dave Albaugh
in
Information Security
on May 13, 2022
How to use PGP encryption on Windows for free
Pretty Good Privacy (PGP) is an encryption program that provides a free way to secure online communications. Find out how to use it in our step-by-step guide.
By
Josh Lake
in
Information Security
on November 16, 2023
Best Disk Encryption Software – the 5 top tools to secure your data
Are you looking for a full disk encryption tool you can trust for Mac or Windows? We recommend six disk encryption tools.
By
Paul Bischoff
in
Information Security
on October 2, 2023
Convincing new TV licensing scam targets UK residents: warning
A new UK TV licensing scam targets British TV owners with phishing emails that threaten to terminate
By
Paul Bischoff
in
Information Security
on March 15, 2022
How to use PGP encryption with Outlook
Learn how to set up PGP encryption in Outlook's desktop app in just a few minutes. Send and receive encrypted emails in Outlook.
By
Josh Lake
in
Information Security
on June 8, 2023
How to use PGP encryption with Gmail
Find out why you should use PGP encryption with Gmail and how to configure the different available options.
By
Josh Lake
in
Information Security
on September 1, 2023
What is PGP encryption and how does it work?
PGP encryption is useful for securing everything from emails to hard drives. But what exactly is it, and how does it work? We find out.
By
Josh Lake
in
Information Security
on November 16, 2023
Page
36
of
47
Previous
1
…
35
36
37
…
47
Next
Comparitech uses cookies.
More info
.
Close