Blog
Malvertising, a form of malware injected into web and app advertisements is on the rise. Join us as we deep dive into some of the most recent malvertising trends, how malvertising works, and more.
By Craig McCart in Information Security on February 8, 2024
Surfshark and Norton Secure VPN share several similarities, but which one takes the top spot? We've detailed everything you need to know in our Surfshark v Norton Secure VPN comparison.
By Craig McCart in VPN & Privacy on December 13, 2023
It's time to face the fact that the Internet is not as warm and fuzzy as we once made it out to be - it's pretty hostile. This post goes over the most common web-based attacks and avoiding them.
By Marc Dahan in Information Security on November 10, 2023
Need a VPN but not sure which is right for you? We’ve tested two popular choices (ExpressVPN and Hola) to see which comes out on top. Is ExpressVPN better than Hola VPN? Read on to find out. 
By Ian Garland in VPN & Privacy on September 20, 2022
Credential dumping attacks are a type of credential-based attacks and they can be difficult to detect. This post looks at how credential dumping works and what you can do about it.
By Marc Dahan in Information Security on September 22, 2023
Web browsers enable us to access all kinds of content. Because of that, they're a tempting target for hackers. We look at the top six web browser vulnerabilities and what you can do to avoid them.
By Marc Dahan in Information Security on October 19, 2023
Trying to watch YouTube videos when you're constantly interrupted by ads is pretty frustrating. Fortunately, there are several ways to stop ads in their tracks - and we’re discussing them right here.
By Craig McCart in VPN & Privacy on June 24, 2025
Turbo VPN has taken the freemium VPN space by storm with its unlimited data cap and excellent server speeds. But some users are looking for alternatives due to the uncertainty around its privacy practices.
By Craig McCart in VPN & Privacy on March 23, 2022
Mobile devices are ubiquitous today - and so are the vulnerabilities they can harbour. This post looks at the most common mobile code vulnerabilities and how to mitigate them.
By Marc Dahan in Information Security on March 23, 2022
Page 108 of 281