15 mins
Can a PDF have a virus? How to stay safe
PDFs are everywhere—invoices, resumes, e-books, tickets, reports. But here’s the thing: not every PDF is safe. Some are infected...
8 mins
4 tips to create a strong password and keep your accounts...
It’s no secret that strong passwords are essential for securing the dozens (or more) of online accounts you use...
10 mins
Internet censorship explained: What it is and how it works
Censorship is no longer limited to history books or a few countries—it increasingly affects users around the world, including...
10 mins
What is Tor? How does it work, and is it safe...
We explain how Tor Browser works, how to use and contribute to it, and the many other things Tor enables us to do online.
8 mins
Phone number generators: Secure, private, and free options explained
A phone number generator is a tool that provides you with an alternate phone number—often temporary—to use in place...
11 mins
How to file a Navy Federal fraud claim and get your...
So, you’ve glanced at your Navy Federal account and noticed something is off. Maybe there’s a charge you didn’t...
22 mins
What is a Wi-Fi VPN and why you should use one
We’ve all done it—connected to a random café’s Wi-Fi, scrolled through emails at the airport, or jumped online from...

Featured

Featured video

Top 10 video games that will change how you view privacy
Play through our picks for some of the best video games about hacking, surveillance, and privacy.