Latest Articles

Family Safety Online

Brainrot: What it means, why children use it, and how to respond as a parent

Brainrot: What it means, why children use it, and how to respond as a parent

Family Safety Online

Brainrot: What it means, why children use it, and how to respond as a parent

Everyone’s talking about brainrot—should you be paying attention too?

Editorial Team07 May 2026


Privacy and Identity Protection

RFID blocking explained: The verdict, the science, and what actually protects you

RFID blocking explained: The verdict, the science, and what actually protects you

Privacy and Identity Protection

RFID blocking explained: The verdict, the science, and what actually protects you

RFID blocking products promise protection from contactless theft - but do you really need one?

Ben Tudor28 Apr 2026


Device Protection

What is a trojan horse attack, and what should I do if I think I’ve opened a trojan?

What is a trojan horse attack, and what should I do if I think I’ve opened a trojan?

Device Protection

What is a trojan horse attack, and what should I do if I think I’ve opened a trojan?

Part social engineering, part sneaky payload, trojans are popular with attackers because they’re powerful, flexible tools for compromising victims. Here’s what to look for – and simple steps to avoid falling for them.

Ben Tudor16 Apr 2026


Family Safety Online

Chat apps for kids: A parent’s guide to getting it right

Chat apps for kids: A parent’s guide to getting it right

Family Safety Online

Chat apps for kids: A parent’s guide to getting it right

Messaging apps open exciting social worlds for kids, but parental guidance is still advised. How to make chatting apps a safe space?

Roman Cuprik09 Apr 2026


Privacy and Identity Protection

Sextortion explained: How to keep yourself and your family safe

Sextortion explained: How to keep yourself and your family safe

Privacy and Identity Protection

Sextortion explained: How to keep yourself and your family safe

We all know not to believe everything we read online. But when an email lands in your inbox from someone claiming to have compromiing images of you, reason tends to go out of the window.

Phil Muncaster30 Mar 2026


Privacy and Identity Protection

Is it safe to buy from Shein?

Is it safe to buy from Shein?

Privacy and Identity Protection

Is it safe to buy from Shein?

Large e-commerce platforms and their databases are always popular targets for cybercriminals.

Ben Tudor17 Mar 2026


Privacy and Identity Protection

How to remove your personal information from the internet: A step-by-step guide

How to remove your personal information from the internet: A step-by-step guide

Privacy and Identity Protection

How to remove your personal information from the internet: A step-by-step guide

Your digital footprint reveals personal data that puts your security and privacy at risk. Here’s how to audit your exposure, remove PII, and stop it from resurfacing.

Phil Muncaster10 Mar 2026


Family Safety Online

Playing it safe: How to spot and fight cyberbullying in online games

Playing it safe: How to spot and fight cyberbullying in online games

Family Safety Online

Playing it safe: How to spot and fight cyberbullying in online games

Children have started gaming earlier than ever, some even before the age of five. How can you shield them from possible cyberbullies and keep the experience safe?

Roman Cuprik03 Mar 2026


Device Protection

Old threats, novel tactics: Android users face new AI security challenges

Old threats, novel tactics: Android users face new AI security challenges

Device Protection

Old threats, novel tactics: Android users face new AI security challenges

ESET Research reveals how cybercriminals have improved their malicious campaigns.

Roman Cuprik02 Mar 2026


Prevention first cybersecurity as a service
Digital safety starts here