Information Security News, Guides & Expert Analysis

Our information security category covers everything you need to keep your data and personal information private. Our experts cover AI, scams, hacking, the safety of popular apps and websites, and more.

Do you need to delete all of your posts on Facebook, Twitter, or Instagram? It's not as straightforward as you might think. Read on to find out how you can delete your posts in bulk with the help of apps and browser extensions.
By Aimee O'Driscoll in Information Security on April 16, 2022
Checksums are a simple means of making sure that data and software you download hasn't been corrupted. We'll show you how to validate checksums in Windows and Mac.
By Paul Bischoff in Information Security on September 16, 2023
Credential stuffing attacks are important to understand so you can keep your personal and business accounts safe. We explain how credential stuffing attacks work and how you can minimize the risk of attacks. 
By Josh Lake in Information Security on January 26, 2024
There are so many different messaging apps on offer, and the differences can be highly technical. Check out our guide for a simple rundown of which apps you should be using to keep your data secure and private.
By Josh Lake in Information Security on April 13, 2022
Remote working and gig economy platforms are increasingly popular. However, major loopholes in some sites' identity verification practices make account fraud a threat to clients and buyers using these services.
By Sam Cook in Identity Theft Protection on July 13, 2021
Steganography is the study and practice of concealing communication. It plays a different role to cryptography, with its own unique applications and strengths.
By Josh Lake in Information Security on December 29, 2023
Tech support scams are on the decline, but they're still a major problem in different parts of the world. Here's everything you need to know about how a tech support scam works, including real examples of what these scams look like from the inside.
By Dave Albaugh in Information Security on July 3, 2019
Children are particularly susceptible to identity theft. They spend more time online than adults and have fewer ways of finding out when their personal information has been taken. Find out what you can do to keep them safe.
By Paul Bischoff in Identity Theft Protection on January 18, 2024
Exploit kits are a silent threat that cybercriminals use to spread malware by attacking system weaknesses. Find out about exploits kits and how they’re used.
By Aimee O'Driscoll in Information Security on July 2, 2020
Page 31 of 42