Quantum computing looks like it could revolutionize our technological world in the not too distant future. Find out what it is and how it may affect our security.
By Josh Lake
in Information Security
on August 2, 2023
Data privacy laws & government surveillance by country: Which countries best protect their citizens?
We conducted research into data privacy laws and Government surveillance in 47 different countries t
By Paul Bischoff
in Surveillance Studies
on March 25, 2022
MySQL is used in many applications, including websites, data warehousing, and log analysis. Use backups to make sure you don’t lose the data you hold in MySQL databases.
By Stephen Cooper
in Net Admin
on December 9, 2024
Warrant canaries were once all the rage, but we hear about them less and less now. Are they still useful? How are the newer transparency reports different?
By Josh Lake
in VPN & Privacy
on April 15, 2022
Websites and apps use dark patterns to manipulate us into taking actions that we may not want to take. Find out how they violate our privacy.
By Josh Lake
in Information Security
on June 14, 2022
These essential SQL server security best practices and tools will help minimize your risk of exposure to data breach and other security risks.
By Amakiri Welekwe
in Net Admin
on September 10, 2024
NordPass is an exciting new password manager from the creators of NordVPN, but is it the right tool
By Aimee O'Driscoll
in Password Managers
on August 10, 2023
Need to perform a scan to find the IP addresses of devices on your local network? We show you some manual command-line techniques, and we also take a closer look at the industry's leading port scanner and tracker tools.
By Stephen Cooper
in Net Admin
on November 11, 2024