Scholarship scams take advantage of students looking to help fund their education. We reveal how to spot and avoid common scholarship scams, as well as what to do if you've been caught out by one.
By Aimee O'Driscoll
in Information Security
on December 21, 2023
The survey of more than 2,000 people questioned Brits and Americans about how they viewed spying on
By Paul Bischoff
in VPN & Privacy
on May 4, 2017
Heard of RFID blocking but not sure what it means? In this post, we explain everything there is to know about RFID blocking and whether you really need it.
By Mark Gill
in Information Security
on January 8, 2023
Need to uninstall Malwarebytes completely? Our guide covers Windows and Mac removals, cleaning hidden files, & finding better protection.
By Craig McCart
in Antivirus
on February 19, 2025
Interested in becoming a data protection officer? We reveal the typical job description, how to get hired, salary expectations, and the top companies that are hiring data protection officers.
By Sam Woolfe
in Information Security
on April 8, 2021
This Avast vs. ESET antivirus comparison looks at protection, security features, ease of use, value for money, and performance to determine which is best. The results are below.
By Steve Adams
in Antivirus
on May 20, 2024
Robocall complaints grew by 165% between 2014 and 2017. We analyzed data from the FTC to understand
By Paul Bischoff
in VPN & Privacy
on May 26, 2022
Bitcoin is just one of many available cryptocurrencies. We take a look at 12 altcoins to see how they function and how they differ from Bitcoin.
By Aimee O'Driscoll
in Crypto
on March 7, 2024
Ransomware in healthcare: Daily downtime costs organizations $900,000, underscoring the critical nee
By Paul Bischoff
in Ransomware Studies
on March 6, 2024