FAQ

  • FAQ

What does HTTP and HTTPS actually mean? A Beginner’s Guide

Have you ever found yourself wondering what the HTTPS at the start of a web address actually means? And didn’t…

4 years ago
  • Malware

Ransomware explained. What it is and how to remove it.

Ransomware is one of the most prolific types of malware threats facing both businesses and individuals, in part due to…

4 years ago
  • FAQ

5 popular myths about hacking and hackers

If movies are to be believed, computer hackers are socially awkward teenagers living in darkened basements, their skin lit up…

5 years ago
  • FAQ

The difference between page followers and likes on Facebook

Page admins may have noticed that they have both a like count and a follow count. On the flip side,…

5 years ago
  • Facebook

Here’s how to quickly check which photos of you are public on Facebook

We discuss how to check what photos you're tagged in that have wide open privacy settings and why you should…

5 years ago
  • FAQ

What was the first ever computer virus and what did it do?

Today, computer viruses and other forms of malware are one of the biggest threats we face online, costing users and…

5 years ago
  • FAQ

What does WWG1WGA mean and what is it associated with?

What does the acroynm WWG1WGA mean, what do the letters stand for and what or who is it associated with.…

5 years ago
  • Phishing

What is the difference between phishing and spear-phishing?

We discuss the differences between phishing scams and spear-phishing scams. A phishing scam is an attempt by a criminal to…

5 years ago
  • Stay Safe Online

What is a credential stuffing attack? Explained…

We discuss what credential stuffing is, how it works and how you can avoid this type of Internet attack. Most…

6 years ago
  • Stay Safe Online

What’s the difference between a targeted and untargeted attack?

When discussing cyber-attacks, you may hear us and others refer to targeted, or untargeted, when describing the type of attack.…

6 years ago