Our information security category covers everything you need to keep your data and personal information private. Our experts cover AI, scams, hacking, the safety of popular apps and websites, and more.
Remote code execution attacks can be quite nasty. In this article, we explain how RCE attacks work and what you can to to protect against them.
Session hijacking can leave you locked-out of your critical accounts. Read on to learn what session hijacking attacks are and what can be done to avoid them.
Comparitech researchers accessed an unsecured Facebook bot farm used to control nearly 14,000 fake accounts. Here’s what we found.
If you receive a message from someone who claims to own images on your site and threatens legal action, don't click the link! It might well be a phishing scam.
A recent Comparitech study found that while some organizations respond promptly to data breach disclosures, most don’t acknowledge such alerts at all.
With digital privacy at the forefront of tech culture right now, there’s never been a better time to find out exactly what information your PC is storing in the background. Below, we’ll dispel a few of the most common Windows 10 spying myths and explain how to
take back control of your diagnostic logs once and for all.
Comparitech researchers set up honeypots on the web to lure in attackers and record their actions. We recorded more than 100,000 attacks in 24 hours.
Reverse tabnabbing is a common online attack that can compromise your online accounts. Thankfully, it's not hard to protect against it. We show you how in this post.
Finding trustworthy apps can be a tricky task at the best of times, and when it comes to your privacy, you simply can’t afford to choose poorly. That’s why we’ve tested numerous Android app lockers and brought you only the best.