Blog
Shadow IT is a unique vulnerability insofar as it's largely unintentional. In this article we look at what shadow IT is, what its risks are and how to mitigiate them.
By Marc Dahan in Information Security on February 8, 2024
Integer overflow attacks exploit coding flaws and can have serious consequences. Learn about integer overflow attack examples in our guide.
By Josh Lake in Information Security on September 11, 2023
Hackers can use packet sniffing attacks to spy on your data. Find out what they are, check out some examples, and learn how to defend against them.
By Josh Lake in Information Security on November 1, 2023
In this post we take a deep dive into Apple's proposed client-side CSAM scanning to find out what all the fuss is about.
By Marc Dahan in Information Security on December 15, 2021
Path traversal attacks may not get as much attention as other online attacks but they can be quite nasty. In this post, we look at how path traversal attacks work and how to prevent them.
By Marc Dahan in Information Security on November 15, 2023
Why would you want to keep your VPN enabled all the time? There are actually some compelling reasons to do this. We look at the pros and cons of an always-on VPN.
By Marc Dahan in VPN & Privacy on February 7, 2025
Millions of anonymous messages and user records apparently from the secret sharing app Whisper were exposed online without a password. Again.
By Bob Diachenko in Information Security on February 1, 2022
Following news reports about popular Muslim prayer apps selling user data to third parties, including the US military, Comparitech decided to take a deeper look at apps for Muslims to find out which ones respect your privacy and which are best avoided.
By Paul Bischoff in VPN & Privacy on October 20, 2023
Want a top-tier VPN at a budget price? Just use our exclusive Atlas VPN coupon to get an 83 percent
By Ian Garland in VPN & Privacy on October 3, 2022
Page 117 of 278