Articles by Dave
Tech support scams are on the decline, but they're still a major problem in different parts of the world. Here's everything you need to know about how a tech support scam works, including real examples of what these scams look like from the inside.
The list of VPNs is long, just about everyone claims to be the best VPN for Mac, so which should you choose for the best experience? Our roundup takes you through the best VPNs for Macs.
You entrust multiple organizations with your personal data every day, but given the number of data breaches that are reported each year, the odds are that your information has fallen into the wrong hands at some point. We reveal the biggest data breaches in history.
Phishing scams are common place, here's how to recognize and avoid them.
A quick search for "VPN" in the Apple app store will reveal hundreds of apps claiming to be the best VPN for iPad. We tested dozens of popular iOS VPNs and narrowed it down to just seven.
We explain what Tor is, how it works, if it is legal and how to use it safely with a VPN. We also explain some of the limitations of Tor and what alternatives exist.
Phishing is a nasty business that runs 24/7/365. During tax season, a special type of phishing attac
Tor is a network of relays and bridges setup to allow people to surf the web anonymously. This guide