10 Best Tweets on Security in 2014
Last year was an eventful one for the IT-security field. There were a lot of incidents, starting with global vulnerabilities to showdowns with local cybercriminals. So, as way of looking back we
0 articles
Last year was an eventful one for the IT-security field. There were a lot of incidents, starting with global vulnerabilities to showdowns with local cybercriminals. So, as way of looking back we
Technology is progressing at a frightening pace and is now part and parcel of our everyday lives. However, despite all the breakthroughs, everything is not as it seems. People are no longer
This is how a seemingly simple SIM card in your smartphone can contribute to the loss of money and personal data.
When you want to save money by buying an antivirus from untrusted online sellers, you ultimately risk your money and might land in trouble afterwards.
One simple Android game can get as much information about the smartphone’s owner as a real spy can.
Using a trojan malware with the Russian name, Tyupkin, hackers made cash withdrawals without so much as accessing bank accounts.
Even when your iPhone is in your hands or on the table, it can reveal some of your secrets to strangers. Here are 10 tips to prevent this from happening.
With the release of iOS 8, Apple claims it can’t access the personal data on your iPhones and iPads and it can’t give it to authorities. But it seems there’s a catch.
The final month of summer wasn’t full of cybercriminal stories, but law enforcement groups around the world still found and punished some evildoers.
On September 9th, Apple showed some new devices and its own payment system, which utilizes an NFC chip, Touch ID sensor and Passbook app. So we had a try to find out how it works, what it gives us and how well this system is protected.
Don’t want your private photos or credit card posted somewhere on the web? You should rethink your approach to cloud services then.
Internet scammers are quite smart and greedy, and know how to disguise their traps, but there are always some ways to find out where these traps are.
Despite the fact that we have cheap unlimited Internet connection almost everywhere, there are situations when each megabyte is literally worth its weight in gold.
July is over and that means it’s time to look back and observe the latest results of the battle between cybercriminals and prosecutors.
The first summer month brought us news about the eternal confrontation of law enforcements and cybercriminals. Let’s see who was busted in June.
Having a chance to store as much as we want is a good thing, but is it bringing us more problems than advantages?
Cabir, the first smartphone virus ever, turns 10. Here are some amusing facts about it.
There was a lot of interesting news about hackers and other cybercriminals, so let’s see who has been busted in May.
The criminals continue their bad business, and law enforcement agencies successfully chase them down. It happens every month, so here are the most interesting cases from April.
Last week, we had a look at private messengers; today, we decided to compile a list of good apps to protect you, your iPhone and its content.
Today, regular instant messengers are hard to trust when it comes to privacy. There are, of course, safer alternatives, but are they able to substitute Skype and WhatsApp?