What are Amazon unauthorized purchase scams?
Here’s how to spot—and avoid—one of the most common Amazon scams.
What is an evil twin attack?
Connecting to public Wi-Fi? Make sure it’s the right network, not its evil twin.
7 ways to stop spam calls and robocalls
Fraudsters have your phone ringing day and night? Reclaim your sanity by blocking them. Here’s how.
What is scareware?
"You have a virus!" Actually—you probably don't.
How websites check your password
Most modern websites hash passwords. This process converts any string of data into a seemingly random, unreadable string of data.
Conti: The most dangerous ransomware gang
We explain Conti, the ransomware group that has crippled Costa Rica, U.S. healthcare networks, and major companies.
So your information is on the dark web. What now?
You can’t take it down. But here are the steps to take to protect your identity.
Why we’d never install a Trusted Root CA on your device
What is a Trusted Root CA, what could go wrong if a VPN company installs its own, and why we won’t ever do so.
Independent audit confirms security of ExpressVPN’s app for Windows
The assessment by cybersecurity firm F-Secure was exceedingly positive.
What are bots and how do they work?
More than half of all internet traffic is made up of bots. Some make our lives easier, while other have more malicious intention. Join us as we discover the difference.