Blog
iOS malware is on the rise, creating new threats. The sophistication of attacks is a reminder that iOS users need to take device security seriously. In this guide, we've listed the latest iOS malware stats.
By Ray Walsh in VPN & Privacy on April 26, 2024
According to data collated by Comparitech researchers, almost 1 in 5 ransomware attacks led to a lawsuit in 2023. Over the past couple of years, lawsuits filed following ransomware attacks have increased, with the overall average over the last five years standing at 12 percent.
By Rebecca Moody in Ransomware Studies on May 1, 2024
Discover the top Omegle alternatives for lively, engaging conversations in real-time. Our comprehensive guide introduces you to a variety of chat platforms, perfect now that Omegle has closed down forever.
By Ray Walsh in VPN & Privacy on April 24, 2024
In the middle of choosing a VPN provider? You should consider where the VPN is based to ensure optimal privacy levels. Keep reading to learn where’s the best place for a VPN to be based.
By Ray Walsh in VPN & Privacy on April 22, 2024
Wondering what the differences between MPLS and VPNs are? This post compares MPLS to VPNs and highlight their similarities and differences, while provding an overview of their security features.
By Marc Dahan in VPN & Privacy on April 22, 2024
Wondering if WhatsApp is secure? This post will help. We provide an overview of WhatsApp's security model, go over its main feature set, and offer tips on using the app securely.
By Marc Dahan in VPN & Privacy on April 16, 2024
Notion isn’t end-to-end encrypted, which means its employees can access user content. Its privacy policies aren’t great either. So why do people love it so much? 
By Justin Schamotta in VPN & Privacy on April 10, 2024
Sick of seeing ads on Instagram? We explore the various tactics and tools you can use to remove or at least reduce Instagram ads, allowing you to focus on content that matters to you.
By Mark Gill in VPN & Privacy on April 10, 2024
Fake apps can cause serious problems. They allow cybercriminals to snoop on you and steal data. This guide explains how to spot and avoid fake apps.
By Ray Walsh in Information Security on April 5, 2024
Page 45 of 255