Cybersecurity, Privacy & Tech News from Comparitech

The Comparitech blog includes cybersecurity guides, news, how-tos, comparisons, and recommendations, all written by industry experts. Read the latest below.

What is a token, and how does token-based authentication work? Learn how tokens are used to verify identity, carry permissions, and secure modern applications. Token-based authentication explained.  
By Ray Walsh in Information Security on May 15, 2026
What is ARP? Address Resolution Protocol (ARP) maps an IP address to a MAC address. At the data link layer, devices only recognise MAC addresses, which is why ARP is needed to link them together.
By Ray Walsh in Information Security on May 14, 2026
What is symmetric encryption? Discover how symmetric encryption uses a single encryption key for both encryption and decryption to deliver fast, efficient data security. In this guide, I explain how it works and why it remains essential for cybersecurity.
By Ray Walsh in Information Security on May 13, 2026
Crunchyroll VPN not working? Learn why your Crunchyroll VPN isn't working on vacation, at work, or o
By Ray Walsh in VPN & Privacy on May 12, 2026
Don't want Claude knowing your IP address or location? Claude blocked in your current country? Find
By Mark Gill in VPN & Privacy on May 7, 2026
Attackers are using WhatsApp's device-linking feature to take over user accounts. Learn what GhostPairing is, how it works, and how to stay safe.
By Richard Ernszt in Information Security on May 6, 2026
Find out what prompt injection attacks are, how they work, the risks for individuals and organizations, and practical ways to protect yourself.
By Richard Ernszt in Information Security on May 6, 2026
Learn what F-Droid is and if it's safe. We look at its features, pros and cons, and how to use it safely, along with some popular FOSS apps you can try out.
By Richard Ernszt in Information Security on April 30, 2026
Learn all about Proton VPN Secure Core: what it is, when it's worth using, the pros and cons, and ot
By Richard Ernszt in VPN & Privacy on April 30, 2026
Page 1 of 256
12256