Blog
Would you like to stream Disney+ shows in South Africa? We explain how to unblock and watch Disney Plus while traveling in South Africa or anywhere else abroad. 
By Ian Garland in VPN & Privacy on April 29, 2021
With digital privacy at the forefront of tech culture right now, there’s never been a better time to find out exactly what information your PC is storing in the background. Below, we’ll dispel a few of the most common Windows 10 spying myths and explain how to take back control of your diagnostic logs once and for all. 
By Ian Garland in Information Security on October 26, 2023
Trying to get Japanese Netflix while traveling? We reveal the best VPNs to watch Japanese Netflix in the US or anywhere else abroad.
By Ian Garland in VPN & Privacy on August 17, 2024
We've analyzed employee monitoring practices in 45 countries to determine which workers are the most-watched. This report contains global employee monitoring statistics covering biometrics, employer access to personal information, employee activity monitoring and workplace CCTV.  
By Paul Bischoff in Privacy Studies on January 22, 2022
Comparitech researchers set up honeypots on the web to lure in attackers and record their actions. We recorded more than 100,000 attacks in 24 hours.
By Paul Bischoff in Information Security on March 15, 2022
Reverse tabnabbing is a common online attack that can compromise your online accounts. Thankfully, it's not hard to protect against it. We show you how in this post.
By Marc Dahan in Information Security on April 23, 2021
Finding trustworthy apps can be a tricky task at the best of times, and when it comes to your privacy, you simply can’t afford to choose poorly. That’s why we’ve tested numerous Android app lockers and brought you only the best.
By Ian Garland in Information Security on September 15, 2023
Many popular Android apps contain hardcoded credentials that can be found and abused by attackers against users, app developers, and APIs.
By Paul Bischoff in Information Security on March 15, 2022
Side-channel attacks don't target cryptographic systems, but their implementations instead. Find out how they can compromise secure algorithms.
By Josh Lake in Information Security on August 4, 2023
Page 129 of 269