Blog
A cryptographer plays an important role in protecting the sensitive information of an organization. In this guide, we explain what a cryptographer does and the necessary steps to gaining a position in the field.
By Sam Woolfe in Information Security on March 11, 2021
Looking to save money on your VPN subscription? We reveal our exclusive AirVPN coupon code and we’ll also let you know about an arguably better service that costs even less per month.  
By Ian Garland in VPN & Privacy on February 2, 2024
One of Chrome’s most beloved browser extensions has been taken down for allegedly containing malware. Not to worry, though: we’re about to introduce you to three alternatives that work just as well as The Great Suspender. 
By Ian Garland in VPN & Privacy on February 9, 2021
True love or true crime? There are a ton of fraudsters out there looking to capitalize on those looking for love. Find out the biggest online dating and romance scam statistics and facts.
By Aimee O'Driscoll in Information Security on March 29, 2023
Interested in protecting your privacy with a VPN but don’t want to pay full price? No problem: we’ll explain how to save a hefty amount on your Avast SecureLine subscription with our Avast coupon. 
By Ian Garland in VPN & Privacy on January 3, 2024
Eye on urban watchfulness: Explore the scope of CCTV surveillance across America's most populated ci
By Paul Bischoff in Surveillance Studies on January 8, 2024
If you notice your computer running slowly, one reason might be bloatware - especially if you're using Windows 10. In this post, we look at what bloatware is and how you can remove it.
By Marc Dahan in Information Security on February 3, 2021
Third-party cookies may disappear soon, but that doesn't mean tracking via cookies will stop. Find out how your data will still be collected.
By Josh Lake in Information Security on January 29, 2021
Thinking of a career as an information security analyst? We explain all aspects of this position, including job responsibilities, how to become a security analyst, and the salary you can expect.
By Sam Woolfe in Information Security on January 28, 2021
Page 109 of 241