Sara J. Nguyen
Sara J. Nguyen is a writer specializing in cybersecurity. She aims to help people protect their data while enjoying technology. She has written about online privacy and tech for over 5 years for several organizations.
When she's not writing about the latest cybersecurity trends, you can find her on LinkedIn.
- Data protection
- Online privacy
- Cybersecurity
Sara J.'s Latest Articles
-
RoboForm Review 2025: Tried and True Affordable Security
RoboForm was released in 2000, making it one of the oldest password managers. We've tested Roboform to see if its kept up with the times.
-
The Best Antivirus for Android 2025 [TESTED]
Antivirus apps for Android aren't always as good as the desktop versions. After testing everything we could find, here are your best options.
-
The Best Password Managers for Android 2025
We tested the best password managers for Android to see how NordPass, 1Password, and RoboForm stacked up against the competition. Find out which app is best in our review.
-
Best VPNs for Android 2025
We rounded up the best VPNs for Android based on pricing, practicality, security, and the ability to watch streaming content abroad.
-
PureVPN Review 2025: Is the Low Cost Worth It?
PureVPN has an affordable price tag with essential security, but you may get what you pay for due to some failed test results.
-
How To Choose and Set Up a Chromebook VPN
Adding a VPN to Chrome is easy with this step-by-step guide on choosing and installing a trustworthy VPN.
-
The Best Security Apps for Android: Privacy Apps and More
Although Android phones have their own security features, you may benefit from adding security apps to further protect your device and privacy.
-
What Is Scareware? How It Works and How To Stop It
Scareware is a method to trick users into downloading malicious software to their devices using scare tactics and ads.
-
What is Bloatware and How to Remove It
Bloatware is unwanted programs or apps on your devices that could affect performance, storage space, and more.
-
What Is Cryptojacking and How Does It Work?
Cryptojacking is a growing cybersecurity threat designed to steal your device's resources to mine cryptocurrency. Keep reading to learn how it works and how to protect yourself.
-
What Is the Dark Web? Everything You Need To Know
The dark web has benefits for people looking for ultimate online privacy, but it also has criminals lurking around the corner.
-
How To Know if Your Security or IP Camera Was Hacked
Security and IP cameras can bring peace of mind, but you'll need to take proactive measures to keep your feed from being hacked.
-
How To Change Your Android Settings (Plus 16 Security Settings to Keep Secure)
Learn how to easily change your Android's settings — plus which security settings you should make sure are set up properly.
-
How Often Should You Reboot Your Router? (And Why You Should)
Like our computers, your router also needs to reboot to stay in shape. But how often should you reboot your router?
-
A Step-By-Step Guide on How to Switch Internet Providers
It's time to switch internet providers, but you could incur fees and have a stressful experience. Here's what to know before you change your internet service provider.
-
How To Remove Your Information from the Internet: The Ultimate Guide
If you're ready to protect your online privacy, here is how to start removing your personal information from the internet.
-
How To Change Social Media Privacy Settings on Twitter, Facebook, and More
Check out this step-by-step guide to changing your privacy settings on Twitter, Facebook, Instagram, TikTok, and YouTube.
-
What Are Smishing Scams? Definition and Examples
Your text messages are an opportunity for cybercriminals to trick you into a scam. Learn more about smishing and how to stop yourself from becoming a victim.
-
What Is Doxxing? How It Works and How To Prevent It
Doxxing is when someone exposes your personal information online, usually as a way to intimidate you. Learn more about what you can do to prevent doxxing and report it.
-
What Is a DDoS Attack? Types, Responses, and Prevention
A distributed denial-of-service (DDoS) attack is when a network is flooded with requests and crashes as a result. Here's what to know about responding to this cyberthreat.
-
8 Ways to Get Free or Affordable Internet
Free internet plans aren't just a dream — it's reality. Check out eight ways to get free or cheap internet at home or in public.