How to stay secure on LinkedIn
Unlike the majority of social media sites, LinkedIn is business oriented and focused on networking. This allows it to stand out and has contributed to its immense popularity. However, as
3298 articles
Unlike the majority of social media sites, LinkedIn is business oriented and focused on networking. This allows it to stand out and has contributed to its immense popularity. However, as
How long has it been since you were last alone? Probably never! Even within the walls of your skull you’re never really alone. For enemies are everywhere — since time
No matter how old you are, it’s most likely you know all about stately Wayne Manor and its billionaire owner, Bruce Wayne. If you don’t you probably have heard of
Apple iPhone users usually consider their phones as impregnable fortresses that Apple has built for them: iPhones are often said to be secure and safe, especially when compared to Android
Stop me if you have heard this before: “I am an awesome multi-tasker. I can chat, listen to the speaker and even take notes at the same time!” Chances are you
It looks like 2016 should be declared a year of ransomware, as new families and new versions are popping up every now and then like mushrooms after the rain. Ransomware
Modern men and women can hardly imagine themselves without their mobile devices, similarly experienced Internet users won’t surf web without an ad blocker. Their popularity has risen fast: as early
In the past few years there have been a lot of discussions surrounding big data. These talks generally centered on the amazing opportunities that the technology provides. The byproduct of
We all know that our opinions on what to expose and what to conceive has changed over time. Consequently, people used specific methods to convey something private so it is
Doctors and patients across the world, beware: cyberciminals have a new member of the family! Despite its young age, a one-month-old ransomware has already encrypted files in two American hospitals
As you might have noticed, a security browser extension called Kaspersky Protection is installed simultaneously with our security solutions. In this post we will explain what it does and how
In one of the previous installments of our GSM saga we mentioned an urban legend of hijacking encryption keys on the fly. It presupposes someone can clone your SIM card
We’ve all seen age-based rating labels displayed prominently before the TV shows or featured on website headings, print media title pages, or theater posters. Did you know that these labels
When I was in middle school a friend of mine got a computer, soon after that he got this cool program called AOL and it instantly made his house the
A few months ago, we were approached by the Dutch TV show Opgelicht?!, which discusses various types of fraud. One of the subjects discussed was the “We-Cycle” phishing campaign where
If your device slows down or hangs up, you are not alone. Sometimes apps refuse to open or a browser will fail to respond at a crucial time. When irritated
Similar to other successful business sharks, cybercriminals are in constant search of new markets. They carry out experiments, change target audiences and provide feedback to the victims — all to
When a product is built, the manufacturer typically has a lifecycle in mind in regards to how long a consumer will ideally use the device. For example smartphones are something
Recently engineers who have been working to improve legacy cellular technologies, were stricken with a thought: “Why would one need a SIM card, if it’s nothing more than a protected data
Hackers are attracted by any web-resource where large amounts of money changes hands, like moths to light. This is what happened with Steam and, according to Valve’s own calculations, 77,000
Since last year, there is no doubt that it’s possible to take control over a connected car remotely. Despite this, we can see zero uncontrolled cars on the streets that