The point of greatest vulnerability is the remote support server. How can you tell whether that could be breached?
What security measures should apply to local communications, and those made by a device with the Internet?
Which operating systems are most suitable and secure, and how should they be updated?
Sales of ‘smart’ devices like thermostats are growing exponentially. But how can you place trust in their security?
Would you buy electrical goods which did not meet an appropriate standard? Then what about a security standard for IoT devices like baby monitors?
Can I set my Mac up to run without an Internet connection?
How can I best use the two Ethernet ports on my Mac Pro?
The UK government doesn’t want to ban encryption, but may see it as a cheap way of winning votes from the easily-impressed.
I have been unable to get my Mac to connect to our new broadband service. How can I get it online?
You know those creepy adverts which keep appearing on websites, offering you products which you have either just […]