Information Security News, Guides & Expert Analysis

Our information security category covers everything you need to keep your data and personal information private. Our experts cover AI, scams, hacking, the safety of popular apps and websites, and more.

Learn what F-Droid is and if it's safe. We look at its features, pros and cons, and how to use it safely, along with some popular FOSS apps you can try out.
By Richard Ernszt in Information Security on April 30, 2026
Learn what an agentic browser is, how it works, and whether it's worth the risk of using for daily b
By Richard Ernszt in Information Security on April 29, 2026
Everything you need to know about smart speaker privacy, including data collection, human review pra
By Richard Ernszt in Information Security on April 23, 2026
Learn what sensitive data is, the main types, and practical ways to protect it. Includes breach resp
By Richard Ernszt in Information Security on April 20, 2026
Discover what a passphrase is, how much safer they are than passwords, and get tips for creating str
By Richard Ernszt in Information Security on April 16, 2026
We explain what URL phishing is, how attackers disguise malicious URLs, and how you can spot and report fake links before they steal your data.
By Richard Ernszt in Blog on April 10, 2026
What is cyberwarfare? Learn how nation-states and state-sponsored hackers use digital operations to
By Ray Walsh in Information Security on April 8, 2026
Explore our thorough checklist for what to do if your email is hacked and how to prevent it in the first place. Protect your accounts with 2FA and smart security habits.
By Richard Ernszt in Information Security on March 27, 2026
Yoti uses AI verification and document uploads to verify your age. Discover how Yoti age verificatio
By Ray Walsh in Information Security on March 20, 2026
Page 1 of 42
1242