ExpressVPN is a solid virtual private network and we’ve picked it as the best VPN overall. One of the reasons we like it is because it’s so easy for beginners to come to grips with. Still, in case you’re feeling some first-ti…
Shadowsocks is a powerful tool that can help you escape censorship, in particular the Great Firewall of China. As much as we like it, though, setting it up can be a bit tricky, which is why we’ve put together this guide on ho…
ProtonVPN and ProtonMail are two of the most popular privacy tools online, and the company behind them has been working to unify the two products. The pricing is also changing slightly.
If you want to escape internet censorship, you may have wondered whether a VPN or Shadowsocks is the better choice for you. Both are powerful tools that will help you evade any blocks, but each comes with its own strengths an…
RFID-blocking wallets are supposed to prevent your RFID card information from being stolen. But do they really work? Even then, is the danger real enough to make?a purchase worth it? Let’s find out.
War, what is it good for? Well, when we’re talking about?wardriving,?it’s away to find unsecured Wi-Fi, sometimes with malicious intent. Wardriving is hard to detect, but with preparation you can protect your home network f…
You’ve heard of two-factor authentication (2FA) and its many benefits, but what about multi-factor authentication (MFA)? MFA can go beyond a simple text or authentication app, and might even happen without you knowing it….
What with all the stories about data harvesting by large companies, you may have wondered what’s actually in it for them. Let’s take a look at what your data’s worth—and why so many companies are doing whatever it takes to …
Bug bounties allow people who discover security flaws in computer software and services to be rewarded with money. So what does it take to be a bug bounty hunter, and can you make a living doing it?
In March 2022, we published instructions for installing the Google Play store on Windows 11. The method involved an open-source project from GitHub. Unfortunately, it contained malware. Here’s how to fix it….
Peer-to-Peer messaging is as reliable as Facebook Messenger or Discord, but you maintain control of your data and don’t rely on a third-party server to talk with people. It’s a better way to communicate….
Robots are already cleaning our homes (and giving free rides to pets), but the market for home security robots is quickly expanding. There are already security bots you can buy today and some exciting ones in development for …
Flashlight apps were once a clever tool inspired by everyone having a display in their pocket. Those days are long gone, though. You shouldn’t be using flashlight apps anymore. We’ll explain why and what you should use instea…
VPNs are powerful tools that can help keep you safe on the web, but they aren’t some kind of magical armor that will protect you from all online dangers—no matter how much VPN providers promise that they are. Let’s take a l…
If you’re looking to escape internet censorship, one interesting option is something called Shadowsocks. Not only is its name intriguing, it also promises to get you past any blocks safely. Let’s see what this protocol can an…
When shopping for a VPN, you may have run into a feature called a warrant canary. Touted as extra protection against government surveillance, you may have wondered what it is and whether it’s useful.
VPNs promise to protect your privacy, but law enforcement and courts the world over have the legal right to ask for your records—provided they can make a case against you. How do VPNs handle these requests, and how much do …
As you probably know, the internet isn’t free everywhere: in some countries, people are met with blocks when accessing sites the government doesn’t approve of. Thankfully, there are ways around these blocks, and you don’t eve…
The SMS mobile phone texting standard turns 30 this year, and its insecurity and legacy features are holding the world back. Here’s why SMS needs to go away as soon as possible.
If you’re shopping for a VPN—or even just curious about what these services can do for you—you’ve probably come across the term “VPN tunnel” or “secure tunnel.” What are these tunnels exactly, and why are they important?…
Do you use an app for your COVID vaccine? It might not be as secure as you’d hope. Apparently, about two-thirds of digital vaccination applications?exhibit behavior that may put your privacy at risk.
Samsung appears to have been the victim of a massive hack, leading to approximately 190GB of data being leaked. This could be a huge deal for Samsung, as the data is alleged to contain lots of company information….
You may have seen people posting screenshots of their PayPal balances with incredible amounts reflected. While the screenshots are really of the PayPal page, the amount has been faked! These balances are used for scams, but a…
An interesting feature that’s popping up more and more in VPN advertisements is one called double VPN or multi-hop VPN. Once offered by just a handful of VPN? services, it seems other VPNs are now catching up to the marketin…
A program called?Nvidia RTX LHR v2 Unlocker was making the rounds all over the tech media as a way to restore the Ethereum mining power of Nvidia’s GeForce RTX 30 and A-series graphics cards. As it turns out, it’s malware an…