Has your email account been hacked? Here’s what to do!
If you think that your email has been compromised, you’ve come to the right place. We’ve packed this guide with helpful information, including how to tell if your email account really has been compromised, and how to take back control. Above all, let’s explore how to help prevent your email from being hacked in the
Learn moreSpoofing: How to protect yourself from fraud on the internet
You probably know someone who’s been the victim of an attempted scam, where some fraudster tries to obtain sensitive information using a false identity or something similar. Cybercriminals also use this centuries-old “tradition” of deception, where they pretend to be someone we know or a reputable company to gain access to confidential data or to
Learn moreGuides
View all
Clone your hard drive: Here’s how
When you think of the term cloning, probably the first thing that springs to...

Show your phone some TLC: Free up storage space on Android
Why are phones like unloved cupboards? That’s not a riddle, but sadly, a fact...

Enjoy a zippy iPhone again by giving it a good clean out
Once an iPhone, always an iPhone. At least that’s what most users of Apple...

Step-by-step guide to formatting your hard drive the right way
You’ve probably read when researching computer security that formatting a hard drive can sometimes...

A VPN helps protect your online privacy and make surfing more secure
Entering your PIN when paying with your debit card, a confidential chat, your own...

Your beginner’s guide: Security Information and Event Management (SIEM)
Cybercriminals generally don’t slow down their pace and online attacks can be relentless. If...

Get your frozen PC up and running again
It’s a bit like Murphy’s law: Your PC or laptop is working perfectly, then...

Clearing the cache on your Mac
You’re almost certain to have come across the term “cache” if your Mac is...
Featured Articles
The darknet — truly the dark side of the internet?
Many associate the darknet with the digital black market for everything that can only be obtained illegally: Drugs, weapons, viruses and malware, contract killers, poison, credit card numbers, all kinds of sensitive data, and so on. The darknet is situated on the dark side of the internet — after all, it’s also a synonym for
Learn moreWhy aren’t there virus scanners for iPhones?
Almost every day, there seems to be a new security warning about ransomware, phishing attacks, or some other digital threat. And while it may seem that Apple products such as Macs, iPads, and iPhones are immune, that isn’t the case. Learn why iOS devices are vulnerable to some of today’s most potent online threats and
Learn morePersonal Data & Privacy
View allWhat is geoblocking and how does it work?
You’ve probably seen this caption some time or another...
Data and the Dark Web: How much is your personal data worth?
With the increasing popularity of online services such as...