Cybersecurity, Privacy & Tech News from Comparitech

The Comparitech blog includes cybersecurity guides, news, how-tos, comparisons, and recommendations, all written by industry experts. Read the latest below.

We're regularly asked to hand over personal data online. Find out about the five principles of fair
By Aimee O'Driscoll in VPN & Privacy on April 13, 2022
Trying to watch Foxtel outside Australia? I reveal the best VPNs for Foxtel so you can carry on streaming from anywhere in the world.
By Osman Husain in VPN & Privacy on February 4, 2026
Trying to find a VPN for Malaysia? Whether you want better online security or to stream your favorite shows abroad, the best VPNs for Malaysia can help. I'll explain the best options and how to use them.
By Osman Husain in VPN & Privacy on March 18, 2026
Want to use a VPN when playing Overwatch online? We reveal the best VPNs for Overwatch plus a step-by-step how-to guide for unblocking the voice chat in countries that block VoIP.
By Osman Husain in VPN & Privacy on July 23, 2024
Elder financial fraud targets elderly victims and is a huge problem resulting in massive losses. We explain what the different types of elder fraud are and how to avoid them. 
By Jon Watson in Information Security on June 30, 2020
Trying to access academic materials on school Wi-Fi, but keep finding websites blocked? I reveal the best VPNs for school and college Wi-Fi and how to unblock your favorite websites.
By Osman Husain in VPN & Privacy on March 2, 2026
Want to bypass DraftKings location blocks? I reveal how a DraftKings VPN can help you access the platform from anywhere and explain more about why the blocks are in place.
By Chris Stobing in VPN & Privacy on January 11, 2026
Want to use some apps with a VPN’s protection and some without? Perhaps you want to mix up VPN connections between devices? You need split tunneling! Here's everything you need to know.
By Paul Bischoff in VPN & Privacy on December 19, 2024
This round up of practical tips will help secure your Linux desktop. 
By Jon Watson in Information Security on March 15, 2022
Page 241 of 253