Cybersecurity
Practical defence: phishing, passwords, 2FA, ransomware, home networks.
Editor's picks in Cybersecurity
Hand-picked starting points — fact-checked and recently refreshed.
Phishing Attacks: How to Spot and Avoid Them in 2026
The single most common way ordinary people lose money online — and how to recognise it.
Read article → CybersecurityTwo-Factor Authentication: A Complete Beginner’s Guide
The single most effective security upgrade most people can make in five minutes.
Read article → CybersecurityPassword Manager Best Practices in 2026
Choose, set up, and live with a password manager without locking yourself out.
Read article →Most recently updated
Sorted by 'last updated' date — fact-checks and refreshes prioritized.
Deepfake Voice Scams: How to Spot a Cloned Voice in 2026
AI voice cloning has crossed the indistinguishable threshold. Here's how to detect a synthetic voice and what to do when a 'family member' calls in distress.
Read article → CybersecurityPost-Quantum Cryptography: What It Means for You in 2026
NIST finalized the first quantum-resistant standards in 2024. Here's what's actually rolling out in browsers, messaging apps, and VPNs — and what 'harvest now, decrypt later' means for the data you sent yesterday.
Read article → CybersecurityAI-Powered Phishing in 2026: How the Attacks Got Better and How to Defend
Phishing emails used to be obvious. Now LLMs write them in your boss's voice, reference last week's meeting, and arrive in batches of millions. Here's what changed and how to defend.
Read article → CybersecurityTravel-Site Breaches: How to Protect Your Bookings After Booking.com
Booking.com confirmed a breach in April 2026 that exposed reservation data. Here's what travellers should actually do — before, during, and after a trip.
Read article → CybersecurityBrowser Zero-Day Exploits: Why Auto-Update Is Your Most Important Security Setting
Google pushed an emergency Chrome patch in April 2026 for an actively-exploited WebGPU bug. Here's why browser zero-days are a real consumer threat — and the one setting that protects you.
Read article → CybersecurityPig-Butchering Crypto Scams: How to Spot and Avoid Them in 2026
The FBI and Dubai police arrested 276 people in a coordinated April 2026 takedown of crypto-romance scam operations. Here's how the scam actually works — and the patterns to recognise.
Read article →More from Cybersecurity
Additional reading — practical guides and reference material.
Ransomware Protection for Home Users: A Practical Guide
Backups, updates, and a few simple habits that prevent the worst day of your digital life.
Read article → CybersecuritySecuring Your Home Wi-Fi Router: A Step-by-Step Checklist
Twenty minutes of setup that protects every device on your network.
Read article →Common cybersecurity questions
Quick answers to questions readers ask most about cybersecurity.
What's the single most important security habit?
Phishing-resistant 2FA (passkey or hardware key) on your primary email. Email is the recovery channel for everything else; protecting it cascades to every other account.
How often should I change my passwords?
Only when there's reason to — a breach alert, suspected compromise, or shared-password turnover. NIST guidance since 2017 has advised against forced periodic rotation; it leads to weaker passwords.
Is my home Wi-Fi secure enough?
Probably needs work. Check: WPA3 (or at minimum WPA2) enabled, default admin password changed, firmware updated within the last 6 months, guest network for IoT devices.
What should I do if I've been hacked?
Change passwords on the affected account and any account using the same password. Enable phishing-resistant 2FA. Check for unauthorized changes (forwarding rules, recovery email, login devices). For financial accounts, contact the institution directly.
Are antivirus apps still needed in 2026?
On Windows, the built-in Defender is sufficient for most users. On macOS and mobile, OS sandboxing covers most desktop-antivirus territory. Third-party antivirus is rarely necessary unless you have specific compliance needs.