Security
Latest about Security
Best free iPhone VPN app in 2024
By Mo Harber-Lamond last updated
VPN There are tons of free iPhone VPNs on the App Store – but only a handful are safe to use. Here are the very best free VPNs for iPhone that I've tested.
How to set up an Android VPN
By Andy Sansom last updated
vpn Setting up a VPN on Android is easier than you might think, and takes just a few minutes to complete when following our simple six-step guide.
How to avoid cyber scams as a student
By Andy Sansom published
It's nearly time to head back to school, but before you hit the campus, make sure you're protecting yourself from popular cyber attacks.
NordVPN takes a podium position in test exposing fake online stores
By Andy Sansom published
NordVPN has emerged as one of the top performers in an independent test aimed at rooting out fraudulent shop fronts.
How to use a VPN to watch your favorite movies on vacation
By Andy Sansom published
VPNs are primarily seen as a privacy and security tool, but they're also a great bit of tech for those on vacation who want to keep streaming.
Use Word, Excel or other Microsoft Office apps on macOS? Hackers can exploit these new flaws to spy on your Mac
By Anthony Spadafora last updated
Security researchers have discovered vulnerabilities in Microsoft’s office software for macOS that can be abused by hackers to spy on you through your Mac.
The best BBC iPlayer VPN in 2024
By Mo Harber-Lamond last updated
VPN From catching up on the Olympics, to Doctor Who and Strictly Come Dancing, the BBC has it all. A BBC iPlayer VPN is your ticket to entry
Incogni data removal service review
By Shaun Rockwood last updated
Review In our hands-on Incogni review, we see how the Surfshark-owned personal data removal service stacks up against the competition.
Google removes hidden Pixel app that could have left millions of phones vulnerable to malware, spyware and other attacks
By Anthony Spadafora published
Pixel phones sold by Verizon ship with a demo app you can’t uninstall which contains a server vulnerability that can be exploited by hackers in their attacks.
Sign up to get the BEST of Tom's Guide direct to your inbox.
Here at Tom’s Guide our expert editors are committed to bringing you the best news, reviews and guides to help you stay informed and ahead of the curve!