The best web browsers for privacy 2024
The best web browsers for privacy offer greater confidentiality than ever before – but which is best for your needs?
Read: The best web browsers for privacy 2024The best web browsers for privacy offer greater confidentiality than ever before – but which is best for your needs?
Read: The best web browsers for privacy 2024The question “What are cookies” has different answers for consumers, businesses and advertisers
Read: What are cookies, and can I avoid them?As digital banking continues to increase, safe online banking tips are vital to keep you – and your money – safe.
Read: Top security tips for safe online bankingThe best messaging apps for 2024 will keep business and personal communications flowing – providing other people are willing to use them
Read: The top 6 best messaging apps for 2024We examine the world of biometrics, including an exploration of what are biometrics used for
Read: What are biometrics, and how do they keep us safe?It’s been thirty years since online advertising first crept into our lives, and this industry has evolved at a phenomenal rate
Read: Online advertising’s evolution over the last 30 yearsUsing a webcam safely involves a little advanced planning – and plenty of common sense.
Read: Dos and don’ts when using a webcamDeleting personal data from old devices is crucial to protecting yourself against identity theft, data loss – and strange phone calls…
Read: How to make sure your old tech doesn’t reveal personal dataPeer-to-peer file sharing is a popular – if controversial – method of distributing data online
Read: What is peer-to-peer file sharing, and is it legal?Selling a secondhand computer is no harder than selling a smartphone, yet it’s something many people are reluctant to do
Read: Ten tips for selling your old computerRecognising and understanding online extortion could prove invaluable if you find yourself being threatened or coerced.
Read: Staying safe: how to tackle online extortionWhat is HTTPS? Only the most secure form of web content distribution, and one which every website should adhere to nowadays
Read: What is HTTPS, and why does it matter?The vast quantities of personal data online represent a goldmine for companies, but a minefield for consumers
Read: How much information about you is on the internet?Methods for improving domestic cybersecurity include password management, router reboots and deleting unsolicited emails.
Read: Ten tips to improve your cybersecurity at homeWhen it’s time to choose an antivirus package, there’s a lot to consider
Read: How to choose an antivirus packageBloatware is the scourge of modern computers, smartphones and tablets. Let's tackle it head-on!
Read: What is bloatware, and how can I tackle it?We explain what is airbrushing used for, how it’s achieved and why it’s controversial
Read: What is airbrushing?Can you save money by not renewing or installing antivirus software subscriptions, or is this too much of a risk?
Read: Do I really need antivirus software?We weigh up the pros and cons of leaving social media to help you to make a potentially life-changing decision.
Read: It might be time to get off social media, guys.In a year when every pound we spend has to work harder than usual, it's important to steer clear of rip-offs and fraud.
Read: How to avoid scams while you shop online this ChristmasWhat is cloud storage? It's worth knowing, since the cloud dominates today’s online experiences.
Read: A beginner’s guide to cloud storageReceiving undeliverable notifications for emails you never sent usually means you’re being targeted by malware.
Read: Why do I keep getting undeliverable notifications for emails I didn’t send?We explore the phenomenon of zombie computer networks, explaining what are botnets used for and how they’re assembled
Read: What is a botnet?Setting up parental controls on your wifi ensures younger members of the household can’t stumble across age-inappropriate content.
Read: How to set parental controls on broadband useThere are many reasons to turbo-charge your online privacy, so don't get caught out - start now!
Read: 8 easy ways to massively improve your online privacyIt’s more important than ever to avoid broadband scams nowadays, since our reliance on the internet has never been greater.
Read: How to avoid being scammed by a fake ISP ’employee’Tor browser uses are many and varied, from safe communications in warzones to avoiding geolocation restrictions
Read: What can I do with the Tor browser?A new year inevitably brings new online security concerns, but simple steps can ensure you’re protected against malware, phishing and hacking
Read: How to ensure your online security is up to date in 2022Their ubiquity means it’s increasingly important to trust chatbots, even though many people are unsure how these automated programs work
Read: Can I trust chatbots?Cryptocurrency scams like Squid provide an easy revenue stream for criminals, but it’s easy to avoid falling for these online schemes
Read: How to avoid falling for cryptocurrency scamsThe thought of ISPs blocking content might seem unethical, but it’s something they’re increasingly being forced to do
Read: Is the internet coming through my home broadband connection censored?It's all down to 'native advertising' - let's see how it works...
Read: Why do I keep seeing eerily relevant adverts online?Staying secure is a constant challenge, requiring a blend of hardware, software, good choices and eternal vigilance.
Read: How to stay safe onlineThe differences between email systems typify the move towards cloud computing and remote over local data storage.
Read: What’s the difference between POP and IMAP email?Safe remote working is easy to accomplish, even if you’ve had no training on video call security or COVID-19 scams
Read: Top tips for working from home safely and securelyAntiviruses represent a last line of defence against malware, but they vary considerably in performance and effectiveness.
Read: Antivirus software – How to secure your devicesIf you’re not sure who are ICANN, you’re not alone. This internet gatekeeper has a surprisingly low profile considering its responsibilities
Read: Who are ICANN, and what do they do?The phenomenon of random words in spam emails might seem pointless, but these unwanted messages are sent quite deliberately
Read: Why do spam emails contain random words?The question of are QR codes safe has become a hot topic in our post-lockdown society, when it seems every public building requires a QR login
Read: Are QR codes safe to use?As one of the internet’s stealthier monitoring tools, email tracking pixels represent a shift in the way companies record our actions
Read: What are email tracking pixels, and why are they used?Public WiFi network security is a major concern, which can be alleviated using a number of common-sense and technological solutions
Read: Staying safe while using public WiFi networksIdentifying spam emails can be invaluable for avoiding malware and spyware, providing added protection to personal and professional inboxes alike
Read: Ten tips for identifying spam emailsWith so much of our lives dependent on internet access, keeping children safe online is more important than ever
Read: Five tips for keeping children safe onlineLastPass isn’t the only password manager out there.
Read: You need a password manager to keep you safe onlineThere are many things to do with an old PC, from dismantling and destroying it to refurbishing or restoring it to factory settings
Read: Five things to do with an old PCDDoS attacks regularly make the news, but this popular form of cybercrime involves concepts many people may be unfamiliar with
Read: What are DDoS attacks?You don’t need an IT qualification to stay safe on the internet – it’s possible to improve your online security in a few minutes with some basic housekeeping
Read: How to improve your online security in five minutes