Cybersecurity, Privacy & Tech News from Comparitech

The Comparitech blog includes cybersecurity guides, news, how-tos, comparisons, and recommendations, all written by industry experts. Read the latest below.

There are two main ways of achieving anonymity via an operating system: virtualization such as Whoni
By Jon Watson in VPN & Privacy on August 3, 2023
Many consider the internet a "free speech zone"., protected by the First Amendment. However, free sp
By Sam Cook in VPN & Privacy on June 27, 2023
Internet radio listeners in the US enjoy listening to Pandora for free. But it has been blocked in other countries. If you want to keep listening to Pandora while abroad, you will need a VPN.
By Paul Bischoff in VPN & Privacy on December 12, 2025
Presented under the guise of trade deals or national security, we lay out some of the laws and bills
By Paul Bischoff in VPN & Privacy on June 8, 2020
Want to set up a hidden service on the Tor network? Or how about an onion site that is only accessible via Tor? No problem! We’ll take you through the process step by step.
By Jon Watson in VPN & Privacy on December 13, 2023
How to maximize privacy under Australia's data retention law. Use a VPN, encrypted OTT communication
By Paul Bischoff in VPN & Privacy on May 27, 2020
Are you filled with uncertainty before downloading software? We’ll tell you how to judge whether a site is safe to download from and how to spot those that might put you at risk.
By Sam Cook in Information Security on October 20, 2023
What is DRM? Why is it used? Is DRM good or bad? Real examples of hardware and software DRM. Blockch
By Paul Bischoff in Information Security on March 18, 2017
OpenVPN is the most widely used VPN package on the planet. We'll show you how to build your own Linu
By Jon Watson in VPN & Privacy on January 21, 2018
Page 246 of 253