Blog
Businesses might be advertising on fake news sites without realizing it. Learn how to stop the sprea
By Paul Bischoff in Information Security on March 15, 2022
Want to set up a hidden service on the Tor network? Or how about an onion site that is only accessible via Tor? No problem! We’ll take you through the process step by step.
By Jon Watson in VPN & Privacy on December 13, 2023
How to maximize privacy under Australia's data retention law. Use a VPN, encrypted OTT communication
By Paul Bischoff in VPN & Privacy on May 27, 2020
Looking to freeze your SSN or see if it's being used without your knowledge? We'll explain how, as well as what to do if someone has your social security number.
By Sam Cook in Information Security on August 25, 2023
Are you filled with uncertainty before downloading software? We’ll tell you how to judge whether a site is safe to download from and how to spot those that might put you at risk.
By Sam Cook in Information Security on October 20, 2023
For this year's Data Privacy Day, we're encouraging readers to spend a few minutes securing their pr
By Paul Bischoff in VPN & Privacy on March 18, 2017
What is DRM? Why is it used? Is DRM good or bad? Real examples of hardware and software DRM. Blockch
By Paul Bischoff in Information Security on March 18, 2017
Fight for your right to privacy by sending your ISP a subject access request, signing the petition t
By Lee Munson in VPN & Privacy on March 18, 2017
If you find yourself making a large number of online payments, you may want to consider these helpfu
By Sam Cook in Information Security on March 19, 2017
Page 252 of 264