Security
Latest about Security

Watch out! Scammers are using this PayPal setting to take over your PC
By Amber Bouman published
Cybercriminals are sending out legitimate PayPal emails to try to trick unsuspecting users into downloading malware.

NordLayer unveils next-gen browser for businesses
By George Phillips published
Business VPN NordLayer has unveiled its next-gen browser, enabling organisations to safeguard sensitive data and combat cyber threats.

Major Gmail change just confirmed for millions — what you need to know
By Anthony Spadafora published
Google is making a big change to how authentication works in Gmail to keep you safe while also preventing cybercriminals and fraudsters from abusing its services.

Does VPN server count really matter?
By Mo Harber-Lamond last updated
vpn Almost every VPN boasts about how many servers it runs, but does it mean anything? Here we explain what really matters.

Don't click this — malicious ads impersonating Google Chrome spreading dangerous malware
By Amber Bouman published
Hackers are using malicious ads to impersonate Google and deliver malware through fake Chrome downloads.

Hackers are posing as Apple and Google to infect Macs with malware — don’t fall for these fake browser updates
By Anthony Spadafora last updated
Fake browser updates are an easy way to trick unsuspecting users into downloading and installing malware which is why hackers keep using them in their attacks.

Proton VPN Stealth protocol: what is it and why should you use it?
By Chiara Castro last updated
vpn With its new obfuscated VPN protocol, Proton VPN is committed to promote internet freedom for everyone globally.

Ring's new Outdoor Cam Plus security camera offers 2K video, better night vision
By Amber Bouman published
Ring just unveiled its first 2K security camera, the Outdoor Cam Plus.
Sign up to get the BEST of Tom's Guide direct to your inbox.
Here at Tom’s Guide our expert editors are committed to bringing you the best news, reviews and guides to help you stay informed and ahead of the curve!