Latest Articles

Cybersecurity Protection

The spam crisis: Why “scam likely” calls are plaguing us

The spam crisis: Why “scam likely” calls are plaguing us

Cybersecurity Protection

The spam crisis: Why “scam likely” calls are plaguing us

To understand the rise of spam calls, we need to look beyond the ringing phone – to the technology, tactics, and loopholes that fuel them.

Editorial Team22 Jul 2025


Device Protection

What is mobile spyware and how do I fight back?

What is mobile spyware and how do I fight back?

Device Protection

What is mobile spyware and how do I fight back?

Our mobile devices are the gateway to our digital lives. The price we pay for this convenience is that it makes our devices an attractive target for malicious actors.

Phil Muncaster15 Jul 2025


Privacy and Identity Protection

Shining a light on the dark web

Shining a light on the dark web

Privacy and Identity Protection

Shining a light on the dark web

Ask many people about the dark web, and a concerned look might cross their faces. The implication is that it’s a lawless digital world populated solely by drug dealers and cybercriminals. But this couldn’t be further from the truth.

Editorial Team08 Jul 2025


Family Safety Online

Which online myths are your kids falling for? Learn how to recognize them

Which online myths are your kids falling for? Learn how to recognize them

Family Safety Online

Which online myths are your kids falling for? Learn how to recognize them

Today, with the rise of social media algorithms, viral challenges, and AI-generated content, it has become increasingly difficult to tell what’s real and what’s not.

James Shepperd01 Jul 2025


Cybersecurity Protection

Now it is certain: NFC data for contactless payments are the new target. Here is what you need to know.

Now it is certain: NFC data for contactless payments are the new target. Here is what you need to know.

Cybersecurity Protection

Now it is certain: NFC data for contactless payments are the new target. Here is what you need to know.

How a novel attack scenario spotted in Eastern Europe became a global threat.

Roman Cuprik27 Jun 2025


Privacy and Identity Protection

Incognito Mode: What it does, what it doesn’t do, and why it matters

Incognito Mode: What it does, what it doesn’t do, and why it matters

Privacy and Identity Protection

Incognito Mode: What it does, what it doesn’t do, and why it matters

Incognito mode is a useful tool but does not equal complete anonymity.

James Shepperd19 Jun 2025


Device Protection

iPhone malware: How can I remove it from my device?

iPhone malware: How can I remove it from my device?

Device Protection

iPhone malware: How can I remove it from my device?

Apple’s iPhones have long been considered among the most secure devices on the planet. But they’re not perfect. Here's why.

Phil Muncaster17 Jun 2025


Device Protection

Is your phone being tracked? How to tackle mobile device privacy and security risks

Is your phone being tracked? How to tackle mobile device privacy and security risks

Device Protection

Is your phone being tracked? How to tackle mobile device privacy and security risks

For most of us, the primary gateway to our digital world is our smartphone. That makes it an attractive target for cybercriminals, government snoopers, advertisers and even jealous partners. This represents a potentially serious security and privacy risk.

Phil Muncaster10 Jun 2025


Family Safety Online

Highlighting common social engineering attacks for kids

Highlighting common social engineering attacks for kids

Family Safety Online

Highlighting common social engineering attacks for kids

Children are often easy targets for online scams that use fear or fake offers. Learn how social engineering works – and how to protect your child from online threats.

James Shepperd03 Jun 2025


Prevention first cybersecurity as a service
Digital safety starts here