Information Security
Want to know more about how to use Tor country codes to change your location? This guide teaches you everything you need to know about using Tor's country codes to spoof your location on Windows, Mac or Linux.
By Josh Lake in Information Security on September 18, 2023
Ponzi schemes and pyramid schemes have been around for a long time. The Ponzi scheme is named after Charles Ponzi, who scammed people out of a lot of money in a fraudulent investment scheme in the 1920’s. Pyramid schemes and Ponzi schemes are often thought to be the same thing, although there are differences that will be explained in this article.
By Steve Adams in Information Security on April 12, 2022
It's 2019, and popup ads are still a problem! We've tested over two dozen popup ad blockers. These 12 ad blockers offer the best quality and are completely free to use. 
By Sam Cook in Information Security on October 25, 2019
The unique properties of encryption, hashing and salting are vital for keeping our online world secure. In this article, we'll look at each of them in depth in order to understand what these processes are and how they are used.
By Josh Lake in Information Security on January 24, 2024
You entrust multiple organizations with your personal data every day, but given the number of data breaches that are reported each year, the odds are that your information has fallen into the wrong hands at some point. We reveal the biggest data breaches in history.
By Dave Albaugh in Data Breaches Studies on July 18, 2022
Comparitech's security research team is disclosing a stored XSS vulnerability in the popular WordPre
By Aaron Phillips in Information Security on January 19, 2023
Comparitech breaks down the concepts behind encryption, explaining the most common algorithms, security protocols and their uses.
By Josh Lake in Information Security on September 29, 2023
Interested in learning more about RSA encryption? We explain how RSA encryption was developed, how it works and the biggest security issues involved.
By Josh Lake in Information Security on March 5, 2024
Phishing scams are common place, here's how to recognize and avoid them.
By Dave Albaugh in Information Security on May 13, 2022
Page 39 of 51