Broadband Guides: Privacy & Security



Who are ICANN, and what do they do?

If you’re not sure who are ICANN, you’re not alone. This internet gatekeeper has a surprisingly low profile considering its responsibilities

Read: Who are ICANN, and what do they do?

Are QR codes safe to use?

The question of are QR codes safe has become a hot topic in our post-lockdown society, when it seems every public building requires a QR login

Read: Are QR codes safe to use?

Ten tips for identifying spam emails

Identifying spam emails can be invaluable for avoiding malware and spyware, providing added protection to personal and professional inboxes alike

Read: Ten tips for identifying spam emails

Five things to do with an old PC

There are many things to do with an old PC, from dismantling and destroying it to refurbishing or restoring it to factory settings

Read: Five things to do with an old PC

What are DDoS attacks?

DDoS attacks regularly make the news, but this popular form of cybercrime involves concepts many people may be unfamiliar with

Read: What are DDoS attacks?

Are paid VPNs better than free ones?

There is a lot of confusion about the relative merits of free or paid VPNs, but the decision often comes down to a choice between privacy or affordability

Read: Are paid VPNs better than free ones?

Staying safe on social media

As people become increasingly aware of how much data they’re sharing online, staying safe on social media is becoming a hot topic

Read: Staying safe on social media

Using the Tor app

The Tor app provides a smartphone-friendly way to keep your home broadband activities below the radar of cookies, search engines and even the authorities

Read: Using the Tor app

Is bitcoin a scam?

Bitcoin scams are endemic, but the world’s first decentralised cryptocurrency does have some merit if you can forgive its many flaws

Read: Is bitcoin a scam?

Bitcoin and the cryptocurrency gold rush

The cryptocurrency gold rush is a digital roulette wheel, where fortunes have been made and lost with little clarity on whether competing currencies have a future

Read: Bitcoin and the cryptocurrency gold rush

How to handle blackmail emails

Although it’s tempting to respond to blackmail emails quickly, a more considered approach is always advisable for this unwelcome threat to our safety

Read: How to handle blackmail emails

Ten tips for video calling

We’ve assembled a list of video calling tips which should make conference calls and online meetings more productive, effective and safe

Read: Ten tips for video calling

How do chatbots work?

Chatbots are a common sight on many websites, and these automated AI programs can be useful in lieu of speaking to a real person

Read: How do chatbots work?

Could my webcam be compromised?

A compromised webcam could pose significant security risks even if you don a disguise, so ensure video cameras on web-enabled devices are functioning normally

Read: Could my webcam be compromised?