Blog
Comparitech researchers set up honeypots on the web to lure in attackers and record their actions. We recorded more than 100,000 attacks in 24 hours.
By Paul Bischoff in Information Security on March 15, 2022
Reverse tabnabbing is a common online attack that can compromise your online accounts. Thankfully, it's not hard to protect against it. We show you how in this post.
By Marc Dahan in Information Security on April 23, 2021
Finding trustworthy apps can be a tricky task at the best of times, and when it comes to your privacy, you simply can’t afford to choose poorly. That’s why we’ve tested numerous Android app lockers and brought you only the best.
By Ian Garland in Information Security on September 15, 2023
Many popular Android apps contain hardcoded credentials that can be found and abused by attackers against users, app developers, and APIs.
By Paul Bischoff in Information Security on March 15, 2022
Side-channel attacks don't target cryptographic systems, but their implementations instead. Find out how they can compromise secure algorithms.
By Josh Lake in Information Security on August 4, 2023
Trying to visit restricted international websites from Tokyo? Trying to get a Tokyo IP address from abroad? We explain how a VPN can help, list the best VPNs for Tokyo, and explain how to use them.
By Mark Gill in VPN & Privacy on September 29, 2023
Looking to stay safe online while traveling in Bangkok? In this post, we’ll cover the best VPNs for Bangkok, how to get a Bangkok IP address, and how to access region-locked websites from anywhere.
By Mark Gill in VPN & Privacy on September 7, 2023
If you’re traveling in Chicago or anywhere else, it’s a good idea to use a Virtual Private Network (VPN). Below, we’ll let you know how a VPN can help you, and which VPNs are best for Chicago, Illinois. 
By Ian Garland in VPN & Privacy on July 10, 2023
There are many different options for pursuing a career in cyber security. In this guide, we outline the most common types of cyber security roles, so you can get a sense of which one will best fit your interests and goals.
By Sam Woolfe in Information Security on April 13, 2021
Page 102 of 241