FAQ

I clicked a suspicious link in an email/message. Am I in trouble? We explain.I clicked a suspicious link in an email/message. Am I in trouble? We explain.
  • Stay Safe Online

I clicked a suspicious link in an email/message. Am I in trouble? We explain.

If we stored all of the questions that we have ever received and analysed the results, by far the most…

3 years ago
What would happen in the US if Roe vs. Wade is overturned?What would happen in the US if Roe vs. Wade is overturned?
  • FAQ

What would happen in the US if Roe vs. Wade is overturned?

In 2021, a woman's right to terminate a pregnancy once again finds itself in the spotlight of American politics. And…

4 years ago
7 of the most notorious computer viruses of all time7 of the most notorious computer viruses of all time
  • FAQ

7 of the most notorious computer viruses of all time

While today's malware threats are dominated by headlines of spyware, ransomware, digital espionage and extortion, the history of cybersecurity and…

4 years ago
What is a homoglyph attack? ExplainedWhat is a homoglyph attack? Explained
  • FAQ

What is a homoglyph attack? Explained

Cyber crooks have plenty of tricks up their sleeves when it comes to deceiving victims, and one such technique is…

4 years ago
How to use reverse image search to avoid scamsHow to use reverse image search to avoid scams
  • Useful Guides

How to use reverse image search to avoid scams

When it comes to tackling certain types of scams such as romance scams and online catfishing, the reverse image search…

4 years ago
What is End-to-End Encryption?What is End-to-End Encryption?
  • FAQ

What is End-to-End Encryption?

We discuss what end-to-end encryption is, how it works and what it means to you, the user. We often hear…

4 years ago
How to stop Google keeping record of your search historyHow to stop Google keeping record of your search history
  • Google

How to stop Google keeping record of your search history

In the murky depths of cyberspace, there is always someone recording your online activity. It's the price we pay for…

4 years ago
The rise of “extortionware” and how it differs from ransomwareThe rise of “extortionware” and how it differs from ransomware
  • Malware

The rise of “extortionware” and how it differs from ransomware

The Cybersecurity landscape is shifting dramatically, as organised cyber-attacks on businesses and other large entities are increasing in frequency and…

4 years ago
I got a suspicious text or email from a bank I don’t use. Why?I got a suspicious text or email from a bank I don’t use. Why?
  • FAQ

I got a suspicious text or email from a bank I don’t use. Why?

If you're a regular user of text or email, and you probably are, you've most likely at some point received…

4 years ago
What is Ransomware-as-a-Service? (RaaS)What is Ransomware-as-a-Service? (RaaS)
  • Malware

What is Ransomware-as-a-Service? (RaaS)

With an estimated two thirds of ransomware attacks being linked to Ransomware-as-a-Service, we discuss what this means. When you want…

4 years ago