Cybersecurity, Privacy & Tech News from Comparitech
How you can be identified even when using Tor, including Javascript, Flash, WebRTC, DNS leaks, doxin
Credit card fraud is big business both online and offline. This article provides information on how
Wannacry might just be the wake-up call your business needs to put a plan in place to avoid ransomwa
Need to keep a low profile while blogging? This guide for whistleblowers, activists, and journos explains how to keep your personal information private while getting your message out there.
Encryption should be a part of your email strategy. This article explains how to use Hushmail to enc
Older people are more at risk of identity theft and often seen as easy targets. We look at the why s
The survey of more than 2,000 people questioned Brits and Americans about how they viewed spying on
While The Pirate Bay is a popular site among torrenting fans, using it can possibly cause issues for you with your ISP and copyright holders. Here are better alternatives.
Not sure whether you should be using a VPN? We reveal whether or not VPNs are legal and how safe they are when used on your devices.