Wifi networks are pretty much everywhere we go. We reveal how to safely use hotspots and keep your d
By Aimee O'Driscoll
in VPN & Privacy
on September 11, 2018
There are plenty of password managers on the market, which can make it difficult to know which one to choose. Here's how we analyze and test password managers.
By Sam Woolfe
in Password Managers
on November 5, 2024
Which is the better VPN for most people: ExpressVPN or CyberGhost? We pit these two services against each other to find out how ExpressVPN and CyberGhost compare.
By Ian Garland
in VPN & Privacy
on January 25, 2024
Struggling to choose a VPN? We’ve put ExpressVPN and Hide My Ass (HMA) to the test, highlighting their strengths and weaknesses to help you come to a decision.
By Ian Garland
in VPN & Privacy
on June 18, 2022
Want to know more about how to use Tor country codes to change your location? This guide teaches you everything you need to know about using Tor's country codes to spoof your location on Windows, Mac or Linux.
By Josh Lake
in Information Security
on September 18, 2023
Children are particularly susceptible to identity theft. They spend more time online than adults and have fewer ways of finding out when their personal information has been taken. Find out what you can do to keep them safe.
By Paul Bischoff
in Identity Theft Protection
on January 18, 2024
Password cracking is one of the tools that hackers turn to when they can't gain access to an account by other means. Find out how they do it.
By Josh Lake
in Information Security
on November 22, 2023
Discover everything there is to know about ExpressVPN Keys: we review its features, compare it to co
By Richard Ernszt
in Password Managers
on July 18, 2024
Covenant and several addons like it have suddenly stopped working. In this article, we explain why t
By Ian Garland
in Kodi
on June 3, 2019
Originally a method for evading online censorship and bypassing restrictions, ‘domain fronting’ can be used by hackers to mirror IP traffic and hide within your network. Here’s everything you need to know.
By James Milin-Ashmore
in Information Security
on February 9, 2023