Security
Latest about Security

Proton VPN Secure Core – what is it and why should you use it?
By Mo Harber-Lamond last updated
vpn Proton VPN's Secure Core feature is marketed as a way of further protecting your traffic. Here we explore how it works, and if it's worth it.

What is VPN obfuscation and do I need it?
By Chiara Castro last updated
vpn VPN obfuscation is the technology that allows you to circumvent VPN blocking. Here, we explore how VPN obfuscation works and when you need it.

NordVPN Double VPN – what is it and why should you use it?
By Mo Harber-Lamond last updated
vpn VPN providers have all sorts of complex features. Here we explain exactly what NordVPN's Double VPN is, and if it's worth using.

What is VPN split tunneling and how does it work?
By Mo Harber-Lamond last updated
vpn It might be something you've heard of when picking a VPN, but what is split tunneling, and is it something you really need? Here, we explain all.

12 million hit in Zacks Investment data breach — how to protect yourself now
By Amber Bouman published
The personal data of 12 million Zacks Investment users has been leaked online.

What is a VPN audit?
By Krishi Chowdhary published
VPN A VPN audit proves the reliability of a VPN service, and is, therefore, essential. Here's everything you need to know about VPN audits.

5 cool things you can do with your Flipper Zero
By Alex Wawro published
The Flipper Zero is a digital multitool that's gotten a bad rap due to concerns it could be used for nefarious hacking, but there's also lots of cool stuff it can do.

Do you know which apps have access to your iPhone photo roll? Here’s how to check
By Amber Bouman published
Sharing unlimited access to your iPhone's photo roll with a bunch of different apps could have serious security and privacy consequences.
Sign up to get the BEST of Tom's Guide direct to your inbox.
Here at Tom’s Guide our expert editors are committed to bringing you the best news, reviews and guides to help you stay informed and ahead of the curve!