How to recognize and protect against credit card scams
By in Information Security, on May 25, 2017 at 12:44 pm
How to recognize and protect against credit card scams

Credit card fraud is big business both online and offline. This article provides information on how to recognize and protect against credit card scams.

What is Global Data Protection Regulation (GDPR) and how should your business prepare for it?
By in Information Security, on May 23, 2017 at 11:40 am
What is Global Data Protection Regulation (GDPR) and how should your business prepare for it?

How to comply with the GDPR. An overview of the rules, requirements, processes, and exemptions you need to know to protect customers’ privacy before 2018.

How to watch ESPN anywhere with a VPN
By in VPN & Privacy, on May 19, 2017 at 9:42 am
How to watch ESPN anywhere with a VPN

Accessing ESPN outside of the US can be a pain. We take you through a step-by-step process of how to achieve that and look at the best VPNs for the job.

Every business can plan to prevent ransomware, here’s how
By in Information Security, on May 18, 2017 at 9:28 am
Every business can plan to prevent ransomware, here’s how

Wannacry might just be the wake-up call your business needs to put a plan in place to avoid ransomware. We list some practical tips every business can use.

How to blog anonymously, a guide for activists, whistleblowers and journalists
By in VPN & Privacy, on May 18, 2017 at 6:30 am
How to blog anonymously, a guide for activists, whistleblowers and journalists

We take a look at how to remain guarded on the web while ensuring that your message reaches the right audience.

Want to live stream AMC? Read our AMC Kodi Addon Tutorial
By in VPN & Privacy, on May 18, 2017 at 6:28 am
Want to live stream AMC? Read our AMC Kodi Addon Tutorial

Here we explore how to live stream AMC on Kodi so that you can catch up with your favorite shows like Better Call Saul and The Walking Dead.l and The Walking Dead.

How to use Hushmail to encrypt your email
By in Information Security, on May 15, 2017 at 5:02 pm
How to use Hushmail to encrypt your email

Encryption should be a part of your email strategy. This article explains how to use Hushmail to encrypt your email for privacy and security.

Famous codes and ciphers through history and their role in modern encryption
By in Information Security, on May 13, 2017 at 7:23 am
Famous codes and ciphers through history and their role in modern encryption

We’ve been hiding messages for as long as we’ve been sending messages. This article discusses famous ciphers in history and their role in modern encryption.

Stealing Grandpa’s Identity: The perfect crime?
By in Information Security, on May 9, 2017 at 4:13 pm
Stealing Grandpa’s Identity: The perfect crime?

Older people are more at risk of identity theft and often seen as easy, lucrative targets. We look at the stats to explorer why seniors are more at risk and how they can stay safe.

Almost half of people don’t know it’s illegal to install a spy app on their partner’s phone
By in VPN & Privacy, on May 4, 2017 at 12:50 pm
Almost half of people don’t know it’s illegal to install a spy app on their partner’s phone

The survey of more than 2,000 people questioned Brits and Americans about how they viewed spying on partners’ and children’s phones and internet activity.

Page 36 of 53