
Is Google really eavesdropping on you?
A recent story suggests Google is secretly recording your conversations and discussions. Are they really doing that?
672 articles
A recent story suggests Google is secretly recording your conversations and discussions. Are they really doing that?
Although the history of Microsoft Windows XP seemed to end in April 2014, the operating system was not completely gone; many embedded devices still ran Windows XP Embedded Service Pack 3, and as such they were dependent on its security updates.
Ransomware is a tough nut to crack — and while it’s distracting you by encrypting your files, it may also be turning your computer into a zombie.
So you just paid for tickets to the Olympics, and now you’re planning your trip to Rio de Janeiro? Check that ticket twice: you may have been scammed.
At the recent I/O 2016 conference Google announced Android N, Wear 2.0, new messenger Allo, voice assistant Google Home, and a laundry list of other tech miracles. What about security?
Suddenly in an instant I became an outsider in the system. While I was being ‘fixed’, I had an opportunity to think about it and now I can sharee my thoughts with you.
Just took your new iPad out of the box? Here we explain how to make it more secure and easy to use
Your smartphone knows everything about you: whom you call and what messages you send, which websites you visit and what photos you take, including even when and where you do it. This data may be used against you.
Apple iPhone users tend to think their device is absolutely secure. We will take you through several types of attacks which usually target Apple’s smartphones.
Instead of writing their own malicious tools, criminals are increasingly using the off-the-shelf malware, and more and more often – totally legitimate software.
We’ve seen drones armed with chainsaws and guns. More alarming though is how easily they can be hacked.
CryptXXX ransomware encrypts files, steals data and bitcoins. Sounds serious, but we have a solution!
Ryan Naraine and Juan Andrés Guerrero-Saade discuss the threat landscape and what is being done to prevent major attacks.
VPN’s features and pitfalls from legal and technical standpoint
Journalists and their whistle-blowers managed to keep the biggest data leak in secret. How did they do it?
USA and Canada governments are fed up with the tyranny of ransomware. Experts from both countries analyzed the latest incidents and released an advisory for their citizens.
Eugene Kaspersky discusses how the world can move towards being more secure.
Like all social media platforms, it’s important to ensure you keep your LinkedIn account secure.
This year is the 120th since the invention of a tin foil hat – simple to produce and very efficient information security tool, preventing those warping and state-altering attacks targeted at our minds.