Dos and don’ts when using a webcam
Using a webcam safely involves a little advanced planning – and plenty of common sense.


Using a webcam safely involves a little advanced planning – and plenty of common sense.
Deleting personal data from old devices is crucial to protecting yourself against identity theft, data loss – and strange phone calls…
Read: How to make sure your old tech doesn’t reveal personal dataBookmarks and favourites are one of the internet’s least treasured resources, despite their hidden value
Read: How to make the most of bookmarks and favouritesSelling a secondhand computer is no harder than selling a smartphone, yet it’s something many people are reluctant to do
Read: Ten tips for selling your old computerRecognising and understanding online extortion could prove invaluable if you find yourself being threatened or coerced.
Read: Staying safe: how to tackle online extortionWhat is HTTPS? Only the most secure form of web content distribution, and one which every website should adhere to nowadays
The vast quantities of personal data online represent a goldmine for companies, but a minefield for consumers
Read: How much information about you is on the internet?Avoiding clickbait will give you a far more enjoyable online experience, away from low-grade content and tracking websites
Read: Tips for avoiding clickbaitWhen it’s time to choose an antivirus package, there’s a lot to consider
Read: How to choose an antivirus packageBloatware is the scourge of modern computers, smartphones and tablets. Let's tackle it head-on!
Read: What is bloatware, and how can I tackle it?We explain what is airbrushing used for, how it’s achieved and why it’s controversial
Can you save money by not renewing or installing antivirus software subscriptions, or is this too much of a risk?
Read: Do I really need antivirus software?We weigh up the pros and cons of leaving social media to help you to make a potentially life-changing decision.
Read: It might be time to get off social media, guys.What is cloud storage? It's worth knowing, since the cloud dominates today’s online experiences.
Read: A beginner’s guide to cloud storageReceiving undeliverable notifications for emails you never sent usually means you’re being targeted by malware.
Read: Why do I keep getting undeliverable notifications for emails I didn’t send?We explore the phenomenon of zombie computer networks, explaining what are botnets used for and how they’re assembled
Read: What is a botnet?Setting up parental controls on your wifi ensures younger members of the household can’t stumble across age-inappropriate content.
Read: How to set parental controls on broadband useThere are many reasons to turbo-charge your online privacy, so don't get caught out - start now!
Read: 8 easy ways to massively improve your online privacyIt’s more important than ever to avoid broadband scams nowadays, since our reliance on the internet has never been greater.
Read: How to avoid being scammed by a fake ISP ’employee’Tor browser uses are many and varied, from safe communications in warzones to avoiding geolocation restrictions
Read: What can I do with the Tor browser?A new year inevitably brings new online security concerns, but simple steps can ensure you’re protected against malware, phishing and hacking
Read: How to ensure your online security is up to date in 2022Their ubiquity means it’s increasingly important to trust chatbots, even though many people are unsure how these automated programs work
Read: Can I trust chatbots?Cryptocurrency scams like Squid provide an easy revenue stream for criminals, but it’s easy to avoid falling for these online schemes
Read: How to avoid falling for cryptocurrency scamsThe thought of ISPs blocking content might seem unethical, but it’s something they’re increasingly being forced to do
Read: Is the internet coming through my home broadband connection censored?It's all down to 'native advertising' - let's see how it works...
Read: Why do I keep seeing eerily relevant adverts online?Staying secure is a constant challenge, requiring a blend of hardware, software, good choices and eternal vigilance.
Read: How to stay safe onlineThe differences between email systems typify the move towards cloud computing and remote over local data storage.
Read: What’s the difference between POP and IMAP email?Safe remote working is easy to accomplish, even if you’ve had no training on video call security or COVID-19 scams
Read: Top tips for working from home safely and securelyAntiviruses represent a last line of defence against malware, but they vary considerably in performance and effectiveness.
Read: Antivirus software – How to secure your devicesIf you’re not sure who are ICANN, you’re not alone. This internet gatekeeper has a surprisingly low profile considering its responsibilities
Read: Who are ICANN, and what do they do?The phenomenon of random words in spam emails might seem pointless, but these unwanted messages are sent quite deliberately
Read: Why do spam emails contain random words?The question of are QR codes safe has become a hot topic in our post-lockdown society, when it seems every public building requires a QR login
Read: Are QR codes safe to use?As one of the internet’s stealthier monitoring tools, email tracking pixels represent a shift in the way companies record our actions
Read: What are email tracking pixels, and why are they used?Public WiFi network security is a major concern, which can be alleviated using a number of common-sense and technological solutions
Read: Staying safe while using public WiFi networksIdentifying spam emails can be invaluable for avoiding malware and spyware, providing added protection to personal and professional inboxes alike
Read: Ten tips for identifying spam emailsWith so much of our lives dependent on internet access, keeping children safe online is more important than ever
Read: Five tips for keeping children safe onlineLastPass isn’t the only password manager out there.
Read: You need a password manager to keep you safe onlineThere are many things to do with an old PC, from dismantling and destroying it to refurbishing or restoring it to factory settings
Read: Five things to do with an old PCDDoS attacks regularly make the news, but this popular form of cybercrime involves concepts many people may be unfamiliar with
Read: What are DDoS attacks?You don’t need an IT qualification to stay safe on the internet – it’s possible to improve your online security in a few minutes with some basic housekeeping
Read: How to improve your online security in five minutesAre you being smart about your smart home devices?
Read: How secure are your smart devices?In an age of endemic cybercrime and phishing, it’s vitally important to improve your home broadband security to minimise any risk of fraud or impersonation
Read: Five easy ways to improve your home broadband network’s securityIn a world of fake news and online conspiracy theories, knowing fact from fiction is more important than ever!
Read: How to read the newsHere are some top tips to help you check up on your security checkup.
Read: How to check if your security software even works.Many people will be receiving smart security tech for Christmas, but broadband outages can be a significant problem
Read: How vulnerable to broadband outages is smart security tech?There is a lot of confusion about the relative merits of free or paid VPNs, but the decision often comes down to a choice between privacy or affordability
Read: Are paid VPNs better than free ones?Don’t let the excitement of Black Friday leave you vulnerable to scams!
Read: The best Black Friday deals might not be what they seem