Bitcoin is just one of many available cryptocurrencies. We take a look at 12 altcoins to see how they function and how they differ from Bitcoin.
By Aimee O'Driscoll
in Crypto
on March 7, 2024
Looking for a new antivirus program to protect your PC, Mac or Android mobile? This comparison looks at the pros and cons of ESET and Sophos so you can find out which is best for your needs.
By Steve Adams
in Antivirus
on June 5, 2024
A security architect plays a vital role in the cyber security team of an organization. If you are interested in pursuing this career path, we have compiled all the information you need to get started.
By Sam Woolfe
in Information Security
on April 8, 2022
Researchers examined 100 secondhand smartphones from Ebay and discovered nearly 1 in 5 contained data from previous owners.
By Paul Bischoff
in Information Security
on December 17, 2019
Data privacy laws & government surveillance by country: Which countries best protect their citizens?
We conducted research into data privacy laws and Government surveillance in 47 different countries t
By Paul Bischoff
in Surveillance Studies
on March 25, 2022
Phishing is a nasty business that runs 24/7/365. During tax season, a special type of phishing attac
By Dave Albaugh
in Information Security
on December 2, 2019
Avira and TotalAV are two big antivirus contenders, but only one of them can come out on top in this head-to-head comparison. Ready for the ultimate AV test?
By Craig McCart
in Antivirus
on May 14, 2022