Information Security
Comparitech's security research team is disclosing a stored XSS vulnerability in the popular WordPre
By Aaron Phillips in Information Security on January 19, 2023
Comparitech breaks down the concepts behind encryption, explaining the most common algorithms, security protocols and their uses.
By Josh Lake in Information Security on September 29, 2023
Interested in learning more about RSA encryption? We explain how RSA encryption was developed, how it works and the biggest security issues involved.
By Josh Lake in Information Security on March 5, 2024
Phishing scams are gaining traction. In this post, we provide an overview of the most common phishing attacks, explain how they work, and give you tips on how to avoid them.
By Marc Dahan in Information Security on July 1, 2025
Pretty Good Privacy (PGP) is an encryption program that provides a free way to secure online communications. Find out how to use it in our step-by-step guide.
By Josh Lake in Information Security on November 16, 2023
Are you looking for a full disk encryption tool you can trust for Mac or Windows? We recommend six disk encryption tools.
By Paul Bischoff in Information Security on October 2, 2023
A new UK TV licensing scam targets British TV owners with phishing emails that threaten to terminate
By Paul Bischoff in Information Security on March 15, 2022
Learn how to set up PGP encryption in Outlook's desktop app in just a few minutes. Send and receive encrypted emails in Outlook.
By Josh Lake in Information Security on June 8, 2023
Find out why you should use PGP encryption with Gmail and how to configure the different available options.
By Josh Lake in Information Security on September 1, 2023
Page 44 of 55