Thousands of hours of in-depth tech research

We put security, privacy and networking services to the test so you can make more informed purchases.

Popular Posts
Would you like to watch Netflix while keeping your online activities hidden from snoopers? We’ve tested dozens of leading providers to find out once and for all which are the best VPNs for Netflix.
By Paul Bischoff in Popular Posts on May 7, 2025
We've conducted thousands of hours of research to find the best VPN services in 2024. We look at speed, security, protocol, price, servers, and much more.
By Paul Bischoff on December 15, 2023
Phishing scams are common place, here's how to recognize and avoid them.
By Dave Albaugh in Information Security on May 13, 2022
There are very few VPNs that work in China. To help readers make an informed choice, we rented a server in Shenzhen and put 59 of the best-known VPNs to the test. Here are our results.
By Paul Bischoff in VPN & Privacy on May 20, 2025
Looking for recent worldwide cyber crime statistics and graphs? We constantly update this huge list of cybersecurity statistics from trusted sources.Ā 
By Andra Zaharia in VPN on November 8, 2024
Don't get caught out with an unsuitable torrenting VPN. Despite bold marketing claims, many VPNs have been shown not to protect your privacy, and others are too slow for torrenting and streaming.
By Paul Bischoff in VPN & Privacy on February 5, 2025
Are you looking for the best ExpressVPN deals and coupons? You're in the right place. We update this page regularly with the best discounts available, including Comparitech exclusive deals.
By Ian Garland in VPN & Privacy on January 2, 2025
Electronic and internet voting can help improve our election systems in several different ways. Each of these concepts rely on cryptography for security - but is cryptography enough?
By Josh Lake in Information Security on August 14, 2020
Android antivirus apps claim to protect your mobile device, but we found a ton of security holes and privacy risks -- one of them even exposes your address book.
By Aaron Phillips in Antivirus on August 17, 2022
Latest news
Ransomware gang Qilin took credit for a cyber attack on Botetourt County Public Schools earlier this
By Paul Bischoff in News on May 29, 2025
Ransomware gang Nitrogen over the weekend took credit for a cyber attack on a school district in Cow
By Paul Bischoff in News on May 26, 2025
Ransomware gang Inc took credit for a cyber attack that disrupted libraries in Pierce County, Washin
By Paul Bischoff in News on May 23, 2025
The Community Hospital of Anaconda notified victims of a data breach that compromised SSNs, medical
By Paul Bischoff in News on May 21, 2025
Ransomware gang Interlock has this morning added West Lothian Council to its data leak. It alleges t
By Rebecca Moody in News on May 21, 2025
Union County, PA notified victims of a data breach that compromised SSNs and protected health info.
By Paul Bischoff in News on May 20, 2025
Latest guides
There are plenty of cheap VPNs services but many sacrifice speed or skimp on security while others won't work with your favorite streaming services. These 6 budget VPN services punch well above their weight.Ā 
By Osman Husain in VPN & Privacy on March 24, 2025
A VPN’s primary purpose is to ensure privacy and security, but no one wants to compromise speed. High speed is always a priority and many have laid claim to the title of the world’s fastest VPN.
By Paul Bischoff in VPN & Privacy on April 9, 2025
Wondering what data free VPNs store and exactly what they do with this data? This guide will tell you everything you need to know, including how to protect yourself from the potential threats of free VPNs.
By Paul Bischoff in VPN & Privacy on February 1, 2023
Looking to find out more about torrenting? We explain exactly what torrenting is, how to torrent safely, and what to do if you get caught.
By Paul Bischoff in VPN & Privacy on May 21, 2024
We'll show you how to access the dark net safely and anonymously using Tor. Don't charge blindly into the abyss. Take these precautions to protect yourself!
By Paul Bischoff in VPN & Privacy on October 27, 2024
A step-by-step guide from beginning to end with screenshots. How to make your own VPN using AWS EC2,
By Paul Bischoff in Popular Posts on October 18, 2019
Latest reviews
Not sure if Norton 360 for MacOS is the right antivirus for you? From protection to performance, we
By Craig McCart in Antivirus on December 25, 2024
If you're considering Panda antivirus for your Mac, read this review first. We put the service through its paces to see if we recommend it.
By Marc Dahan in Antivirus on December 11, 2024
Are you considering GData as your Mac antivirus? This post can help. We put GData through rigorous t
By Marc Dahan in Antivirus on November 22, 2024
In this post, we test Trend Micro's antivirus for macOS to see if it's worth recommending. We focus
By Marc Dahan in Antivirus on November 20, 2024
In this post, we reviewed ESET NOD32 antivirus for macOS in depth to determine whether we can recomm
By Marc Dahan in Antivirus on November 17, 2024
In this post, we rigorously tested MacKeeper to see if we can recommend it in good faith, noting its
By Marc Dahan in Antivirus on October 23, 2024
Blog
Can wifi owner see what sites I visit? If you connect your phone to wifi, the network owner can track you. Learn how to use a VPN to prevent wifi surveillance.  
By Ray Walsh in VPN & Privacy on May 29, 2025
Ransomware gang Qilin took credit for a cyber attack on Botetourt County Public Schools earlier this
By Paul Bischoff in News on May 29, 2025
Geo-blocking preventing you from watching your favorite Chinese TV channels? Find out how you can stream CCTV-1, Hunan TV, and Zhejiang TV in the USA with the help of a VPN.
By Mark Gill in VPN & Privacy on May 28, 2025
Having trouble getting rid of the Altruistics virus from your Windows PC? We take you through every step of removing Altruistics virus from your device in this handy-step-by-step guide.
By Mark Gill in Antivirus on May 28, 2025
Protect your child online. Learn how to put parental blocks on their tablet to filter content, manage screen time, and enhance their digital safety.
By Craig McCart in Parental Control on May 27, 2025
Want to use a VPN and Tor to browse securely and privately on iOS? There are several important caveats to be aware of when using these privacy tools together on iPhones and iPads.
By Mark Gill in VPN & Privacy on May 27, 2025