
How are age-based gaming ratings set?
Age-based gaming ratings serve as a warning that the contents of the game may be unsuitable to children. We will review different rating systems used to label console and PC games.
3279 articles
Age-based gaming ratings serve as a warning that the contents of the game may be unsuitable to children. We will review different rating systems used to label console and PC games.
What happens when real cyber experts head to TV to stop cybercrime?
Check if your PC is infected with the help of our free security tools.
CTB-Locker comes back and strikes 70 web server from 10 countries across the globe. Who is at risk and what should they do?
Manufacturers need to change their mindset when it comes to the IoT
Apple SIM, Google Project Fi and, for example, GigSky are all virtual SIM cards. OK, what’s so virtual about them?
2015 proved: it’s possible to hack a connected car remotely. But is it as dangerous as it appears?
Are you sure that one-time SMS passwords reliably protect your mobile bank? Think again! In this article we explain how Trojans fool two-factor authentication.
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.
While the popular notion is that Macs are virus-proof, it is actually quite a myth. These computers can catch viruses and Ransomware.
Find out how to make sure you’re keeping your Tumblr account as secure as possible.
Does your use of social media make you a liability to your company?
In this post we explain, what’s new in the latest update of the Private Browsing tool and how to use it.
Triada is a modular mobile Trojan that actively uses root privileges to substitute system files and uses several clever methods to become almost invisible
We’ve reached an age where our digital and analog lives are one and the same. How can we make sure our kids grow up digitally savvy and safe?
A look at the evolution of mobile threats in 2015 and some predictions for 2016
Over the weekend, Snapchat was compromised via a phishing email pretending to be from company CEO.
While many mobile applications serve as a mere distraction, these apps can help simplify or streamline your daily life.
Kaspersky Lab and partners reveal details of the joint investigation of the Lazarus group hazardous activity.
Shodan and Censys are the search engines for the Internet of Things and this duo is capable of wreaking havoc in a lot of different ways
The next step in SIM cards evolution is not about squeezing them into even more miniscule form factor, it’s about replacing them at all — with a profile stored in connected device.