Credential dumping attacks are a type of credential-based attacks and they can be difficult to detect. This post looks at how credential dumping works and what you can do about it.
Web browsers enable us to access all kinds of content. Because of that, they're a tempting target for hackers. We look at the top six web browser vulnerabilities and what you can do to avoid them.
Trying to watch YouTube videos when you're constantly interrupted by ads is pretty frustrating. Fortunately, there are several ways to stop ads in their tracks - and we’re discussing them right here.
Turbo VPN has taken the freemium VPN space by storm with its unlimited data cap and excellent server speeds. But some users are looking for alternatives due to the uncertainty around its privacy practices.
Mobile devices are ubiquitous today - and so are the vulnerabilities they can harbour. This post looks at the most common mobile code vulnerabilities and how to mitigate them.
We've put two popular VPN providers, NordVPN and AVG Secure VPN, to the test, and created a side-by-side comparison of everything their products have to offer. Which comes out on top?
OpenVPN is one of the most widely-used VPN protocols available. In this post, we look at the protocol, in-depth, to expose how it works and whether it's safe to use.
Want to watch MEGOGO on vacation? Megogo is region-locked, which means you’ll need a VPN to watch it outside of your home region. We explain how to stream Megogo anywhere with a VPN.