Why do I keep seeing eerily relevant adverts online?
It's all down to 'native advertising' - let's see how it works...


It's all down to 'native advertising' - let's see how it works...
Staying secure is a constant challenge, requiring a blend of hardware, software, good choices and eternal vigilance.
Read: How to stay safe onlineThe differences between email systems typify the move towards cloud computing and remote over local data storage.
Read: What’s the difference between POP and IMAP email?Antiviruses represent a last line of defence against malware, but they vary considerably in performance and effectiveness.
Read: Antivirus software – How to secure your devicesIf you’re not sure who are ICANN, you’re not alone. This internet gatekeeper has a surprisingly low profile considering its responsibilities
Read: Who are ICANN, and what do they do?The phenomenon of random words in spam emails might seem pointless, but these unwanted messages are sent quite deliberately
The question of are QR codes safe has become a hot topic in our post-lockdown society, when it seems every public building requires a QR login
Read: Are QR codes safe to use?As one of the internet’s stealthier monitoring tools, email tracking pixels represent a shift in the way companies record our actions
Read: What are email tracking pixels, and why are they used?Identifying spam emails can be invaluable for avoiding malware and spyware, providing added protection to personal and professional inboxes alike
Read: Ten tips for identifying spam emailsWith so much of our lives dependent on internet access, keeping children safe online is more important than ever
Read: Five tips for keeping children safe onlineLastPass isn’t the only password manager out there.
There are many things to do with an old PC, from dismantling and destroying it to refurbishing or restoring it to factory settings
Read: Five things to do with an old PCDDoS attacks regularly make the news, but this popular form of cybercrime involves concepts many people may be unfamiliar with
Read: What are DDoS attacks?Are you being smart about your smart home devices?
Read: How secure are your smart devices?In an age of endemic cybercrime and phishing, it’s vitally important to improve your home broadband security to minimise any risk of fraud or impersonation
Read: Five easy ways to improve your home broadband network’s securityIn a world of fake news and online conspiracy theories, knowing fact from fiction is more important than ever!
Read: How to read the newsHere are some top tips to help you check up on your security checkup.
Read: How to check if your security software even works.Many people will be receiving smart security tech for Christmas, but broadband outages can be a significant problem
Read: How vulnerable to broadband outages is smart security tech?There is a lot of confusion about the relative merits of free or paid VPNs, but the decision often comes down to a choice between privacy or affordability
Read: Are paid VPNs better than free ones?Don’t let the excitement of Black Friday leave you vulnerable to scams!
Read: The best Black Friday deals might not be what they seemProtecting your webcam is a simple step, but it could provide valuable peace of mind if you start receiving blackmail emails
Read: How a cheap webcam cover could save you from extortion threatsThere are easy ways to improve online password security, which remains a troublesome aspect of the online experience for many people
Read: How to improve online password securityAs people become increasingly aware of how much data they’re sharing online, staying safe on social media is becoming a hot topic
Read: Staying safe on social mediaClean up your online footprint to protect yourself from past mistakes!
Read: How to clean up your social media accounts without deleting them.The Tor app provides a smartphone-friendly way to keep your home broadband activities below the radar of cookies, search engines and even the authorities
Read: Using the Tor appBitcoin scams are endemic, but the world’s first decentralised cryptocurrency does have some merit if you can forgive its many flaws
Read: Is bitcoin a scam?With the pandemic forcing us to spend more time at home, what are the best productivity apps for work and play?
Read: What are the best productivity apps for a pandemic?Despite being an occasional annoyance, two factor authentication has been developed to optimise personal safety while online
Read: The history of two factor authenticationThe cryptocurrency gold rush is a digital roulette wheel, where fortunes have been made and lost with little clarity on whether competing currencies have a future
Read: Bitcoin and the cryptocurrency gold rushAlthough it’s tempting to respond to blackmail emails quickly, a more considered approach is always advisable for this unwelcome threat to our safety
Read: How to handle blackmail emailsWe’ve assembled a list of video calling tips which should make conference calls and online meetings more productive, effective and safe
Read: Ten tips for video callingChatbots are a common sight on many websites, and these automated AI programs can be useful in lieu of speaking to a real person
Read: How do chatbots work?A compromised webcam could pose significant security risks even if you don a disguise, so ensure video cameras on web-enabled devices are functioning normally
Read: Could my webcam be compromised?Must we forever put up with those extra layers of security...
Read: Why do I need to use One Time Passwords?