7 Volcanoes: On The Way To Sidley
Renowned mountaineer Olga Rumyantseva has started her first ascent of the Kaspersky 7 Volcanoes expedition. Olga is set to solo-climb the highest volcano on each continent and a week ago
3198 articles
Renowned mountaineer Olga Rumyantseva has started her first ascent of the Kaspersky 7 Volcanoes expedition. Olga is set to solo-climb the highest volcano on each continent and a week ago
From its then-revolutionary touchscreen interface to the somewhat ill-fated Siri voice control, Apple’s iPhone has always set the standard for mobile devices since its first version hit the stores in
Software vulnerabilities are published every day, by the hundreds, and most users don’t think much about them, aside from them time it takes them to update their software. But when
Twitter is an essential part of anyone’s brand these days, whether you’re a small company, a media mogul or someone who simply likes to share her views with anyone willing
These days we conduct so much of our lives online that invariably – whether it is with our online bank accounts, our shopping sites, our credit cards, our emails –
Most people are aware that there is a seemingly infinite sea of hackers out there whose goal in life is to steal sensitive data from corporate networks. And while tomes
Climbing the highest volcanoes on every continent alone, without any backup is definitely not for the faint-hearted! You’d have to be bold, spirited…and just a little bit crazy. But Olga
Google’s social networking site, Google+, continues to grow in popularity. But as with all social media sites, over-sharing your personal information is easy to do on Google+. Use these 10
Heads up, you secretive Facebook users who have made yourself unsearchable on the world’s most popular social networking platform: You can hide no more. Facebook announced updated privacy features —
It’s that time of year when, in the afterglow of the holiday season we start to play with all of our new toys. For a lot of people that will
You probably hadn’t even thrown away the wrapping paper and upgraded from pajamas to pants before you were knee-deep in your new computer (probably a laptop of one brand or
When a browser asks you if you want it to store, save, or remember your password and you allow it to do so, it actually does store your password in
The first thing you want to be aware of when discussing security features on Google’s Chrome browser is that many of the best options aren’t built into the browser, but
It may seem like a great idea to become Facebook friends with people overseas that you’ve never met – and never will meet – but Facebook has a suggestion: don’t
It’s a sad reality that, sooner or later, most businesses will be hacked. If this happens to your business, there are two types of response to avoid. First, there’s the
On Christmas Eve we counted the results of our light-hearted survey on Facebook. Users were asked to say which piece of malware, if any, they most associated with Santa. It
Although some people dismiss it as a minor concern that’s exaggerated by over-protective parents, cyberbullying can have devastating effects on children and families. While traditional bullying can involve physical and
This really shouldn’t need to be said, but here goes: You should never, ever – under any circumstances – post a picture of your debit or credit card anywhere online.
If you’re on Twitter, you know the Fail Whale: When Twitter’s servers get overloaded (it happens surprisingly often) an image appears of a sleepy whale being hoisted out of the
The last year has seen a lot of changes in the threat landscape, with the emergence of a number of new cyber espionage tools such as Gauss and Flame, as
Computers have advanced in the last 20 years from building-sized mainframes to smartphones that can fit in your pocket (and have become infinitely more capable, to boot), yet we use