The Comparitech blog includes cybersecurity guides, news, how-tos, comparisons, and recommendations, all written by industry experts. Read the latest below.
Spear phishing can happen to anyone, as one woman learned when an imposter on Facebook stole all of
Ads & malware are served up by thousands of servers on the internet. We shows how to use your comput
Anonymity, like security, has many layers. Observers have developed methods of piercing anonymity wh
How to use a VPN to tunnel into China and watch TV shows and movies on Chinese video sites like Youk
Cookie legislation has been transposed onto most laws across the EU. Is your website compliant? We l
Ebay lacks encryption on several less critical, but still sensitive pages. This could run afowl of l
There are two main ways of achieving anonymity via an operating system: virtualization such as Whoni
Many consider the internet a "free speech zone"., protected by the First Amendment. However, free sp
Internet radio listeners in the US enjoy listening to Pandora for free. But it has been blocked in other countries. If you want to keep listening to Pandora while abroad, you will need a VPN.