What are Trojans?
What are Trojans? Only the most insidious – and potentially damaging – form of malware
Read: What are Trojans?What are Trojans? Only the most insidious – and potentially damaging – form of malware
Read: What are Trojans?Targeted advertising is the tip of an iceberg of personal data endlessly being resold across the internet
Read: How targeted is targeted advertising?If you’ve ever wondered what is doxing, we explain the origins and dangers of this growing online phenomenon.
Read: What is doxing, and why is it dangerous?Understanding the pros and cons of jailbroken smartphones helps you to decide whether to risk your device’s safety for extra functionality
Read: Should I jailbreak my smartphone?Zero-day malware is too new to be caught by most antivirus packages. We explain how to stay safe
Read: What is zero-day malware?We explain how to get your security back on track when your online passwords are compromised.
Read: What should I do if my online passwords are compromised?Life can be less stressful once you learn how to live without social media accounts and re-embrace traditional technologies
Read: How to live without social media accountsEmployee monitoring tools are vital for home workers, but they come at the cost of personal privacy
Read: What are employee monitoring tools, and how do they work?The best web browsers for privacy offer greater confidentiality than ever before – but which is best for your needs?
Read: The best web browsers for privacy 2024The question “What are cookies” has different answers for consumers, businesses and advertisers
Read: What are cookies, and can I avoid them?As digital banking continues to increase, safe online banking tips are vital to keep you – and your money – safe.
Read: Top security tips for safe online bankingThe question ‘what are torrents’ can be answered quite simply, considering how complex these file sharing protocols are.
Read: What are torrents?The best messaging apps for 2024 will keep business and personal communications flowing – providing other people are willing to use them
Read: The top 6 best messaging apps for 2024It’s been thirty years since online advertising first crept into our lives, and this industry has evolved at a phenomenal rate
Read: Online advertising’s evolution over the last 30 yearsUsing a webcam safely involves a little advanced planning – and plenty of common sense.
Read: Dos and don’ts when using a webcamDeleting personal data from old devices is crucial to protecting yourself against identity theft, data loss – and strange phone calls…
Read: How to make sure your old tech doesn’t reveal personal dataBookmarks and favourites are one of the internet’s least treasured resources, despite their hidden value
Read: How to make the most of bookmarks and favouritesPeer-to-peer file sharing is a popular – if controversial – method of distributing data online
Read: What is peer-to-peer file sharing, and is it legal?Selling a secondhand computer is no harder than selling a smartphone, yet it’s something many people are reluctant to do
Read: Ten tips for selling your old computerRecognising and understanding online extortion could prove invaluable if you find yourself being threatened or coerced.
Read: Staying safe: how to tackle online extortionWhat is HTTPS? Only the most secure form of web content distribution, and one which every website should adhere to nowadays
Read: What is HTTPS, and why does it matter?The vast quantities of personal data online represent a goldmine for companies, but a minefield for consumers
Read: How much information about you is on the internet?Avoiding clickbait will give you a far more enjoyable online experience, away from low-grade content and tracking websites
Read: Tips for avoiding clickbaitMethods for improving domestic cybersecurity include password management, router reboots and deleting unsolicited emails.
Read: Ten tips to improve your cybersecurity at homeWhen it’s time to choose an antivirus package, there’s a lot to consider
Read: How to choose an antivirus packageBloatware is the scourge of modern computers, smartphones and tablets. Let's tackle it head-on!
Read: What is bloatware, and how can I tackle it?We explain what is airbrushing used for, how it’s achieved and why it’s controversial
Read: What is airbrushing?Can you save money by not renewing or installing antivirus software subscriptions, or is this too much of a risk?
Read: Do I really need antivirus software?We weigh up the pros and cons of leaving social media to help you to make a potentially life-changing decision.
Read: It might be time to get off social media, guys.In a year when every pound we spend has to work harder than usual, it's important to steer clear of rip-offs and fraud.
Read: How to avoid scams while you shop online this ChristmasWhat is cloud storage? It's worth knowing, since the cloud dominates today’s online experiences.
Read: A beginner’s guide to cloud storageReceiving undeliverable notifications for emails you never sent usually means you’re being targeted by malware.
Read: Why do I keep getting undeliverable notifications for emails I didn’t send?We explore the phenomenon of zombie computer networks, explaining what are botnets used for and how they’re assembled
Read: What is a botnet?Setting up parental controls on your wifi ensures younger members of the household can’t stumble across age-inappropriate content.
Read: How to set parental controls on broadband useThere are many reasons to turbo-charge your online privacy, so don't get caught out - start now!
Read: 8 easy ways to massively improve your online privacyIt’s more important than ever to avoid broadband scams nowadays, since our reliance on the internet has never been greater.
Read: How to avoid being scammed by a fake ISP ’employee’Tor browser uses are many and varied, from safe communications in warzones to avoiding geolocation restrictions
Read: What can I do with the Tor browser?A new year inevitably brings new online security concerns, but simple steps can ensure you’re protected against malware, phishing and hacking
Read: How to ensure your online security is up to date in 2022Their ubiquity means it’s increasingly important to trust chatbots, even though many people are unsure how these automated programs work
Read: Can I trust chatbots?Cryptocurrency scams like Squid provide an easy revenue stream for criminals, but it’s easy to avoid falling for these online schemes
Read: How to avoid falling for cryptocurrency scamsThe thought of ISPs blocking content might seem unethical, but it’s something they’re increasingly being forced to do
Read: Is the internet coming through my home broadband connection censored?It's all down to 'native advertising' - let's see how it works...
Read: Why do I keep seeing eerily relevant adverts online?Staying secure is a constant challenge, requiring a blend of hardware, software, good choices and eternal vigilance.
Read: How to stay safe onlineThe differences between email systems typify the move towards cloud computing and remote over local data storage.
Read: What’s the difference between POP and IMAP email?Safe remote working is easy to accomplish, even if you’ve had no training on video call security or COVID-19 scams
Read: Top tips for working from home safely and securelyAntiviruses represent a last line of defence against malware, but they vary considerably in performance and effectiveness.
Read: Antivirus software – How to secure your devicesIf you’re not sure who are ICANN, you’re not alone. This internet gatekeeper has a surprisingly low profile considering its responsibilities
Read: Who are ICANN, and what do they do?