Information Security
Find out how authenticator apps work, why they’re more secure than SMS/email-based 2FA, and discover the best authenticator apps with our guide.
By Richard Ernszt in Information Security on May 31, 2025
Is AirDropping safe? Learn how Apple’s file-sharing works, the risks, and how to stay protected with simple settings and privacy tips.
By Richard Ernszt in Information Security on May 19, 2025
Protect yourself from fake job scams. Learn the signs of employment fraud, from vague descriptions to upfront fees. Our guide helps you spot red flags & secure your job search.
By Craig McCart in Information Security on May 18, 2025
Are online survey sites safe? For the most part, not really. Learn how to spot red flags, avoid scams, and stay secure while doing surveys for extra income.
By Richard Ernszt in Information Security on May 16, 2025
Want to keep your passwords, credit card details, and other sensitive personal information private? We cover all you need to know about infostealer malware and how to protect your data.
By Mark Gill in Information Security on May 3, 2025
Received a LinkedIn message that seems just too good to be true? We take you through the tell-tale signs of LinkedIn scams and how you can protect yourself when using LinkedIn.
By Mark Gill in Information Security on May 2, 2025
What is scareware and how does it work? Learn how to identify and remove scareware, or prevent such threats from popping up in the first place.
By Richard Ernszt in Blog on April 18, 2025
Whether you received a Steam gift card offer or are just curious about this online scam, this post will explain how the scam works and what you can do to avoid it.
By Marc Dahan in Information Security on April 2, 2025
Because of Instagram's popularity, scammers are very active on the platform. In this post, we look at the most common Instagram scams and how to avoid them.
By Marc Dahan in Information Security on March 29, 2025
Page 1 of 52
1252