Thinking of studying for a degree in cyber security law? We reveal the key information you need to know before choosing a degree, such as the top schools and the salary you can expect to earn once you've completed your program.
By Sam Woolfe
in Information Security
on August 2, 2023
Health officials in Argentina exposed a database on the web containing personal information from people who applied for COVID-19 circulation permits, which exempt recipients from quarantine restrictions.
By Paul Bischoff
in Information Security
on July 30, 2020
SIM swapping fraud is difficult to protect against but that doesn't mean you can't do anything about it. In this post, we look at how SIM swapping fraud works and how you can avoid it.
By Marc Dahan
in Information Security
on January 31, 2024
Ultrasonic tracking is used in various applications on mobile and other devices, sometimes without the user’s knowledge. Find out more about how to block ultrasonic tracking and what it means for your privacy.
By Aimee O'Driscoll
in Information Security
on January 19, 2023
Project Runway is back for its eighteenth season and you can watch the whole thing online. Below, we’ll let you know how to live stream Project Runway season 18 from abroad with a VPN.
By Ian Garland
in TV Streaming
on December 3, 2019
Learn how to understand what your kids are really saying online and help protect their privacy with
By Richard Patterson
in VPN & Privacy
on August 4, 2023
There are many ways of keeping a network secure. However, one aspect often taken lightly or even ignored is attacks by users behind the firewall. User and Entity Behavior Analytics (UEBA) will help you identify and combat such security issues.
By Liku Zelleke
in Net Admin
on July 22, 2024
Is free antivirus good enough to safeguard your digital treasures? Check out our guide as we explore the differences between free vs paid AV.
By Lee Munson
in Antivirus
on October 20, 2023
Children are particularly susceptible to identity theft. They spend more time online than adults and have fewer ways of finding out when their personal information has been taken. Find out what you can do to keep them safe.
By Paul Bischoff
in Identity Theft Protection
on January 18, 2024
Learn how to monitor internal servers and public facing websites easily with our comprehensive Site2
By Liku Zelleke
in Net Admin
on May 7, 2020