An explanation of hacking: what it really is, what makes a hacker, the different kinds of hackers. Including a rundown of some prominent hackers of all kinds.
Find out what having a digital identity really means as well as discover ways to keep yours safe, secure, and protected as you roam the digital world.
In computing, a Trojan horse is a decoy that hides malware. Find out what a Trojan is and how to detect and protect against this sneaky type of attack.
Everything you should know about malware, how it works, what it does and how to remove it. Find the best anti-malware and malware removal tools here!
Learn what online tracking is, how it works, and who's tracking you on the web. Find out why you're being tracked online & what you can do to protect your data.
The ultimate in cyber eavesdropping, a man-in-the-middle attack (MITM) effectively jumps into your conversation with a server and secretly steals or alters your communications. Find out more about how it works and how you can prevent it here.
Newly discovered Android malware hijacks your phone even when you believe you have switched it off. Find out how it works.
Your complete guide to keylogging: what it is, how to protect your passwords and credit card info, and how to detect and remove a keylogger.
Everything you ever wanted to know about Denial of Service attacks, including how they work, their history, and how to stay safe from one. This easy-to-read expose will help you better understand one of the most common attacks out there.
Zombies are real, and your computer might be one! Learn everything you’d ever want to know about botnets, including how to keep out of one. This comprehensive guide will also teach you about historical botnets, how they’re put together, and the sort of damage they can do to the unprepared.
Your complete guide to Mac ransomware, how to remove it and what you can do to protect yourself against attack. (Plus a quick story about hot dogs with human faces.)
Your complete guide to Android ransomware and what you can do to protect yourself against attacks.
Learn everything you ever wanted to know about phishing emails (and then some) and how to avoid becoming a victim. Learn to secure yourself in minutes.
Worried about the next big ransomware attack? Read our guide to learn how to protect yourself against ransomware, or how to remove it if you’ve been infected.
Android app permissions can give apps control of your phone and access to your private conversations, photos, and more. Here's what you need to know to stay safe and in control.
Find out what a computer virus is, what it does, how it spreads and how you can protect yourself, with examples of the most common types of virus.