13 mins
What is a zip bomb, and how it can harm your...
Zip bombs may look like tiny, harmless files, but they pose a real threat. Imagine receiving a zip file...
7 mins
PPTP VPN (Point-to-Point Tunneling Protocol): What it is and how it...
Point-to-Point Tunneling Protocol (PPTP) is one of the oldest VPN protocols still in use today.  However, compared to more modern...
18 mins
Types of internet connections explained
Some people think “Wi-Fi” is the internet—but that’s a common mix-up. Wi-Fi is just the way your devices connect...
16 mins
SSL VPN: What it is and why it matters
SSL VPN (Secure Sockets Layer Virtual Private Network) is a tool many organizations rely on to secure remote work...
11 mins
What is my DNS? How to check and find your DNS...
When you want to access a website or online platform, you type the address into your internet browser, like...
Brute-force password cracking: A hammer cracking a padlock.
15 mins
Brute force attack: What it is and how to prevent it
A brute force attack is exactly what it sounds like: instead of looking for a secret way into your...
12 mins
SIM swapping: What you need to know to stay protected
Malicious actors could cancel your SIM card and divert all your calls to themselves. Here are 5 ways to protect yourself.

Featured

Featured video

Top 10 video games that will change how you view privacy
Play through our picks for some of the best video games about hacking, surveillance, and privacy.