Information Security News, Guides & Expert Analysis

Discover the most common QR code risks and how to stay safe as a regular user, plus tips for sharing your codes securely as a creator or business.
By Richard Ernszt in Information Security on February 17, 2026
Learn what Potentially Unwanted Programs (PUPs) are, the risks they pose, how to spot them on your system, and how to remove them—all in one guide.
By Richard Ernszt in Information Security on February 13, 2026
Have you encountered a popup warning you about an Apple security alert? It’s a common scam. We’ll explain how to stop it from happening again in the future.
By Ian Garland in Information Security on January 12, 2026
Find out how to delete your Skype account and why you should do so in the first place. Plus, some useful Skype alternatives for personal or work chats.
By Richard Ernszt in Information Security on January 12, 2026
Ever wondered how hackers manipulate DNS to redirect users to cloned websites? In this guide, we explain how DNS cache poisoning and DNS spoofing attacks work.
By Ray Walsh in Information Security on December 2, 2025
Keep your shopping safe—learn what ghost tapping is and how it works, plus how to spot the common signs and protect yourself against scams.
By Richard Ernszt in Information Security on December 1, 2025
Complete guide to what dark web monitoring is—how it works, how it helps stop hackers from misusing your data, and whether it's safe and worth the cost.
By Richard Ernszt in Information Security on December 1, 2025
Here’s how to spot student finance scams before they become an issue, and how to proceed if you’ve already fallen for a student loan scam.
By Richard Ernszt in Information Security on November 30, 2025
Learn what data harvesting means and how it happens, which laws limit data harvesting, and what steps you can take to protect your personal information.
By Richard Ernszt in Information Security on November 23, 2025
Page 1 of 43
1243