Ernest Sheptalo -
NAT “firewall”: Everything you need to know about network security17 mins
NAT (Network Address Translation) is a feature built into most routers, helping to manage traffic between your devices and...
Chantelle Golombick -
10 phishing red flags in emails and what to do about...12 mins
Protect yourself by learning to recognize the most obvious signs that someone is trying to scam you with a phishing email.
Chantelle Golombick -
What is IPsec? How this security protocol protects your network15 mins
IPsec, short for Internet Protocol Security, is a protocol suite designed to protect data as it travels across the...
Tyler Cross -
How to prevent phishing attacks: Best practices and prevention tips10 mins
Phishing is by far the most common “hack” used to steal passwords, take over accounts, and enter systems without authorization.
Jennifer Pelegrin -
Can a PDF have a virus? How to stay safe15 mins
PDFs are everywhere—invoices, resumes, e-books, tickets, reports. But here’s the thing: not every PDF is safe. Some are infected...
Michael Pedley -
4 tips to create a strong password and keep your accounts...8 mins
It’s no secret that strong passwords are essential for securing the dozens (or more) of online accounts you use...
Ana Jovanovic -
Internet censorship explained: What it is and how it works10 mins
Censorship is no longer limited to history books or a few countries—it increasingly affects users around the world, including...
Featured
Marcus Tsui -
How to track your own luggage4 mins
Vanessa Ko -
Is WhatsApp safe?5 mins
Featured video
Top 10 video games that will change how you view privacy
Play through our picks for some of the best video games about hacking, surveillance, and privacy.