Should we ban screen time for children?
Proposals to restrict or ban screen time for children are highly contentious. We consider the pros and cons


Proposals to restrict or ban screen time for children are highly contentious. We consider the pros and cons
There’s a surprisingly long list of things do before selling an old computer to keep your data safe
Read: Protecting your data when selling an old computerIt may be tempting to consume pirated content, but you can’t ignore the legal and safety risks.
Read: The risks of consuming pirated contentSocial engineering is on the rise – we explain how to avoid becoming its next victim
Read: What are ‘social engineering’ scams?The spyware threat is real – but there are plenty of things you can do to reduce your risk of becoming a victim
Read: How big a threat is spyware?Knowing how to choose a web browser for your specific needs can simplify and streamline your online experiences
What are Trojans? Only the most insidious – and potentially damaging – form of malware
Read: What are Trojans?Social media algorithms may be designed to reinforce existing beliefs, but they’re also rewiring our brains without us realising
Read: How social media algorithms can literally change your mindIf you’ve ever wondered what is doxing, we explain the origins and dangers of this growing online phenomenon.
Read: What is doxing, and why is it dangerous?There’s a common assumption that they’re all the same, yet the differences between ransomware, spyware and malware are significant.
Read: The differences between ransomware, spyware and malwareUnderstanding the pros and cons of jailbroken smartphones helps you to decide whether to risk your device’s safety for extra functionality
Zero-day malware is too new to be caught by most antivirus packages. We explain how to stay safe
Read: What is zero-day malware?We explain how to get your security back on track when your online passwords are compromised.
Read: What should I do if my online passwords are compromised?Employee monitoring tools are vital for home workers, but they come at the cost of personal privacy
Read: What are employee monitoring tools, and how do they work?We investigate why too much screen time can be harmful for us – and especially for our children.
Read: Why too much screen time can be harmfulThe best web browsers for privacy offer greater confidentiality than ever before – but which is best for your needs?
Read: The best web browsers for privacy 2024The question “What are cookies” has different answers for consumers, businesses and advertisers
Read: What are cookies, and can I avoid them?As digital banking continues to increase, safe online banking tips are vital to keep you – and your money – safe.
Read: Top security tips for safe online bankingThe question ‘what are torrents’ can be answered quite simply, considering how complex these file sharing protocols are.
Read: What are torrents?The best messaging apps for 2024 will keep business and personal communications flowing – providing other people are willing to use them
Read: The top 6 best messaging apps for 2024We examine the world of biometrics, including an exploration of what are biometrics used for
Read: What are biometrics, and how do they keep us safe?It’s been thirty years since online advertising first crept into our lives, and this industry has evolved at a phenomenal rate
Read: Online advertising’s evolution over the last 30 yearsUsing a webcam safely involves a little advanced planning – and plenty of common sense.
Read: Dos and don’ts when using a webcamDeleting personal data from old devices is crucial to protecting yourself against identity theft, data loss – and strange phone calls…
Read: How to make sure your old tech doesn’t reveal personal dataBookmarks and favourites are one of the internet’s least treasured resources, despite their hidden value
Read: How to make the most of bookmarks and favouritesPeer-to-peer file sharing is a popular – if controversial – method of distributing data online
Read: What is peer-to-peer file sharing, and is it legal?Selling a secondhand computer is no harder than selling a smartphone, yet it’s something many people are reluctant to do
Read: Ten tips for selling your old computerRecognising and understanding online extortion could prove invaluable if you find yourself being threatened or coerced.
Read: Staying safe: how to tackle online extortionWhat is HTTPS? Only the most secure form of web content distribution, and one which every website should adhere to nowadays
Read: What is HTTPS, and why does it matter?The vast quantities of personal data online represent a goldmine for companies, but a minefield for consumers
Read: How much information about you is on the internet?Avoiding clickbait will give you a far more enjoyable online experience, away from low-grade content and tracking websites
Read: Tips for avoiding clickbaitMethods for improving domestic cybersecurity include password management, router reboots and deleting unsolicited emails.
Read: Ten tips to improve your cybersecurity at homeWhen it’s time to choose an antivirus package, there’s a lot to consider
Read: How to choose an antivirus packageBloatware is the scourge of modern computers, smartphones and tablets. Let's tackle it head-on!
Read: What is bloatware, and how can I tackle it?We explain what is airbrushing used for, how it’s achieved and why it’s controversial
Read: What is airbrushing?Can you save money by not renewing or installing antivirus software subscriptions, or is this too much of a risk?
Read: Do I really need antivirus software?We weigh up the pros and cons of leaving social media to help you to make a potentially life-changing decision.
Read: It might be time to get off social media, guys.In a year when every pound we spend has to work harder than usual, it's important to steer clear of rip-offs and fraud.
Read: How to avoid scams while you shop online this ChristmasWhat is cloud storage? It's worth knowing, since the cloud dominates today’s online experiences.
Read: A beginner’s guide to cloud storageReceiving undeliverable notifications for emails you never sent usually means you’re being targeted by malware.
Read: Why do I keep getting undeliverable notifications for emails I didn’t send?We explore the phenomenon of zombie computer networks, explaining what are botnets used for and how they’re assembled
Read: What is a botnet?Setting up parental controls on your wifi ensures younger members of the household can’t stumble across age-inappropriate content.
Read: How to set parental controls on broadband useThere are many reasons to turbo-charge your online privacy, so don't get caught out - start now!
Read: 8 easy ways to massively improve your online privacyIt’s more important than ever to avoid broadband scams nowadays, since our reliance on the internet has never been greater.
Read: How to avoid being scammed by a fake ISP ’employee’Tor browser uses are many and varied, from safe communications in warzones to avoiding geolocation restrictions
Read: What can I do with the Tor browser?A new year inevitably brings new online security concerns, but simple steps can ensure you’re protected against malware, phishing and hacking
Read: How to ensure your online security is up to date in 2022Their ubiquity means it’s increasingly important to trust chatbots, even though many people are unsure how these automated programs work
Read: Can I trust chatbots?