Remote working and gig economy platforms are increasingly popular. However, major loopholes in some sites' identity verification practices make account fraud a threat to clients and buyers using these services.
By Sam Cook
in Identity Theft Protection
on July 13, 2021
Want to stop unwanted emails? Unsolicited spam emails are a growing problem and can pose a number of security risks. Find out how you can block unwanted emails and take control of your inbox.
By Mark Gill
in VPN & Privacy
on August 25, 2023
Discover how you can mitigate threats to the security of your Apache Web Server with this security guide
By Amakiri Welekwe
in Net Admin
on February 13, 2025
The terms Virtual Network Computing (VNC) and Virtual Private Networking (VPN) sound similar but are
By Jon Watson
in VPN
on March 7, 2022
Do you often shop online? There are some risks when handing over your personal information, but you can protect your privacy by switching to safe and anonymous online payment methods.
By Mark Gill
in VPN & Privacy
on November 2, 2023
Hosting a public event in the coming months? If you’re responsible for a networking mix or a big-name concert coming to town, pay attention. Here's the low-down on what to expect and how to handle privacy at events.
By Victoria McIntosh
in Information Security
on April 15, 2022
Trying to choose which antivirus is better for you? We will take a look at which is better at protecting your system: Norton or Sophos?
By Steve Adams
in Antivirus
on June 7, 2024
Bitwarden is one of the most trusted on the market, but we wanted to put it to the test. Read our Bi
By Sam Woolfe
in Password Managers
on April 8, 2022
A cluster of databases containing over 350 million customer records including names, phone numbers, and other personal information was left open online, without a password required to access it.
By Paul Bischoff
in VPN & Privacy
on October 15, 2020
As a security specialist, you will play a crucial role in protecting the overall IT security of an organization. This post reveals all aspects of this role: what security specialists do, how to get hired and salary expectations.
By Sam Woolfe
in Information Security
on April 8, 2022