Ian is a computing graduate with a love of technology and programming, particularly in the area of machine learning.
Paul Bischoff is a tech writer covering IT-related subjects since 2012. A digital nomad who depends on the internet to make a living, he's always seeking out the best value and highest quality products and services on the web. He previously worked as the China editor at Tech in Asia and is a regular contributor at Mashable, as well as several blogs for internet startups around the world. You can find him on Twitter at @pabischoff.
Stephen Cooper has taken a close interest in online security since his thesis on internet encryption in the early 90s. He believes that technology should serve the needs of people and so writing about protection from snoopers and hackers is his ideal niche. After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology.
Mark is a freelance writer and editor, specialising in financial privacy. Upon earning his bachelor’s degree in English and Journalism, he relocated from wet and windy England to sunny Spain. Most of his time is spent reading up on cryptocurrency and complaining about the lack of rain
Osman has been covering tech and related subjects since 2013 and was previously an editor at Tech in Asia. He wholeheartedly believes that the internet should be used for social good and to break down barriers to information. The ongoing witch hunt against net neutrality, he feels, is a recipe for disaster.
Since 2017 Tim has been a full-time tech copywriter. Tim writes extensively on net admin topics helping businesses and entrepreneurs to keep their data protected.
Samuel Cook is a freelance writer who covers a wide range of topics, including internet privacy, security, data journalism, and digital content streaming. He can often be neck-deep in data visualizations.
As a tech writer and editor, Aimee has worked on hundreds of articles that help readers tackle tricky issues. She is dedicated to providing thorough yet easily digestible information that resonates with fellow lovers of everything digital. When she’s not tapping away at her keys, you can find her chasing her kids around and enjoying the great outdoors.
Tom Blackstone is a former salesperson turned tech writer. Before 2014, he sold home theater systems, televisions, computers, video games, and many other tech products. Since 2014, he has been a full-time writer. During this time, his work included three Ebooks about the Chromecast and Evernote. He has always enjoyed trying out new devices, learning how to use them, and using this knowledge to help others find enjoyment in them.
Jon is a senior Linux systems administrator currently working in the Internet security field. Most of his time is spent reviewing security related issues and developing ways to mitigate damage or prevent them from happening in the first place. He has articles published in Linux Journal and Linux Magazines and was previously the Tech Channel editor for b5 Media.
William has been fiddling with tech for as long as he remembers. This naturally transitioned into helping friends with their tech problems and then into tech blogging.
Lee Munson is Comparitech's Security Researcher. Lee is a regular contributor to the Sophos’ Naked Security blog and Social Media Manager for Brian Honan’s BH Consulting. He is also the proud winner of the Best UK Security Blog and Best European Security Blog at the 2015 European Security Blogger Awards.
Josh Lake is a writer who focuses on the intersections between technology, privacy and security. His work helps companies and individuals get the most out of technological developments, without having to sacrifice their civil liberties or open themselves up to the ever-increasing threats of cybercrime.
Dave Albaugh is a freelance Information Infrastructure Master Technician who consults on computer & network security for small businesses, SOHOs & entrepreneurs. He has documented loads of "knowledge nuggets" for different clients on topics such as security, understanding the technology behind the internet, and the infrastructure behind a computer network, all written in non-techie English. When he's not putting out client's fires, Dave is a roadie for his wife's Taiko group and a non-biker motorcycle enthusiast
Aaron Phillips is a technical writer from the Boston metro area. He likes Apple phones, Android tablets, Raspberry Pi, streaming media, and smooth transitions from third to first person. I want to hear about your exploits and vulnerabilities, you can DM me on Twitter or send me an email at email@example.com. If it's sensitive, ask for my Signal or public key.
Liku Zelleke is a technology blogger who has over two decades’ experience in the IT industry. He hasn’t looked back since the day, years ago, when he discovered he could combine that experience with his other passion: writing. Today, he writes on topics related to network configuration, optimization, and security.
Penny Hoelscher has a degree in journalism and a background in legacy programming. But, with an aversion to danger and conflict, she now combines interests in writing and IT safely from behind her computer screen.
Richard Patterson is the Founder of Comparitech and has spent the last 13 years building online businesses in the US and UK which empower consumers looking to purchase tech products and services.
Victoria McIntosh is an Information and Privacy professional residing in Halifax, Nova Scotia. She holds a Masters in Library and Information Science, and is certified by the International Association of Privacy Professionals as an Information Privacy Technologist. Regularly contributing to the technology community through blogging and providing conference talks, she feels privacy is an important freedom in the digital world, and works best with a fresh cup of coffee in her hands.
Rebecca is a writer and editor, living and working in Portugal. Over the past 10 years, she’s been dedicated to providing in-depth information on all things digital, with a particular focus on streaming media.
Chris Stobing is an internet security writer and blogger, born and raised in the heart of Silicon Valley. Surrounded by tech and everything that makes it tick from birth, he's had an interest in internet privacy and networking technology for years, and has come to Comparitech to contribute his knowledge on both.
John Kimball is a software engineer and writer who's developed safety-critical software for aircraft, software engineering tools with scripting languages, and security software for small devices. He has an interest in information security, web development, activist technology, and system/network administration.
David Gilbert has worked as a journalist for the last decade, and for the last seven years has focused on technology, including cybersecurity, privacy and cryptocurrencies. Most recently he worked as European technology editor at the International Business Times, specialising in covering the global smartphone industry and the dangerous world of cybercrime. Prior to this David worked as the Technology Editor for the UK edition of IBTimes for over three-and-a-half years, winning the prestigious Digital Writer of the Year award at the Online Media Awards in 2013. Previously, he worked as news editor at Trusted Reviews for two years after moving to London from Ireland where he worked for national and regional newspapers for three years.
Ben's sysadmin knowledge includes but is not limited to: Windows Server, including IntelliMirror; Windows Domain; DNS; RAID; Network connectivity, and most other admin-related tasks.
David is a CompTIA Network+ certified technical writer. He has over 5 years of experience in technical roles including support, sysadmin, sysadmin team lead, and director positions.
Stuart is addicted to all things Information Security with a mission to bring quality, pragmatic cyber security knowledge to general IT users, small and startup companies.
David Balaban is a computer security researcher with over 15 years of experience in malware analysis and antivirus software evaluation. David provides expert opinion on contemporary information security matters, including social engineering, penetration testing, threat intelligence, online privacy and white hat hacking.
Steve Adams is a professional writer with 15 years experience working with some of the world’s leading technology companies including Hewlett Packard, Ericsson and AutoDesk. He has a passion for taking complex tech, privacy and security topics and making them accessible and easy for anyone to understand.
Helping people make better decisions for their online security and privacy through educational content that changes perspectives and habits.
Theo is a technical writer with a penchant for Bitcoin, blockchain, and cryptocurrencies.
Gillian Jones spent 10 years with the NHS with 5 of them spent working in Information Governance, with responsibility for ensuring compliance throughout the organization for Freedom of Information, Data Protection and Environmental Information Regulations, as well as privacy, confidentiality and information security via auditing, advice and guidance and organization wide training. She holds an ISEB in Data Protection as well as a degrees both in history and creative practice and now works as a freelance writer with a passion for information security and IT
Al is a writer of both code and words. He specializes in new, interactive forms of technology and always has the perfect emoji for any situation. When he's not furiously typing away, you can find him with his nose in a book or soaking up some sun outdoors, usually with a cat in tow.
Gabe Tang is a cybersecurity graduate and IT professional. He’s enthusiastic about computers, video games, esports, and new technology. His work background consists mostly of IT jobs. Now as a freelance writer, he uses that experience to describe and explain technology to readers.
Jonathan is a freelance tech writer living in Dublin, Ireland, regularly covering areas around security and privacy, from hack attacks to the latest security software.