
Hacked social networks lead to nightmare draft for Laremy Tunsil
Heading into the NFL Draft, Laremy Tunsil was considered by many to be the top player in the draft and would be one of the first players selected. Unfortunately for
3347 articles
Heading into the NFL Draft, Laremy Tunsil was considered by many to be the top player in the draft and would be one of the first players selected. Unfortunately for
Each day, Internet users around the world are under attack as new cyber threats are deployed by criminals. Unfortunately, many people still are not using antiviruses and firewalls at all
Yesterday one of 2ch’s users attracted the attention of Russian media. This man streamed video from the hacked computers on YouTube. The anonymous user turned these sessions into a real
While Freddie Mercury may have belted out Is this real life? Is this just fantasy? over 40 years ago, today’s parents are faced with the stark reality that their children
The common user experience when it comes to ransomware looks like this: you open a website then accidentally download and install a piece of software. You might even not notice
We know that our drumming on the importance of changing your passwords frequently can seem like overkill to many of our readers. However, to help prove the importance of this,
Curios fact: in the United States the transition of merchants to EMV cards (popularly known as chip-and-pin cards), which has the purpose of fighting fraud, is actually driving fraud losses
Saint Petersburg photographer Egor Tsvetkov recently published a photo project, created with the help of a service called FindFace. He turned the public’s attention to the website and accidentally awoke
Unless you are from Russia, you probably haven’t heard of a service, that analyzes an image of a person and finds their account in VK.com social network. It’s called FindFace.
In the morning of April 5, 2016 a number of American radio stations treated their listeners to quite the unusual broadcast. Over the course of 90 minutes, the hosts discussed
Recently, Microsoft debuted a new, shiny update to their ancient crash screen, affectionately labelled the ‘blue screen of death’ (BSOD) by techies everywhere. This updated version brings some much needed
Let’s start with where the word ‘captcha’ came from. It turns out that captcha is an acronym for Completely Automated Public Turing test to tell Computers and Humans Apart. The
Today information is currency. Data is bought and sold, stolen and changed, and of course, gathered. If you want to know something about somebody you can find a real bunch
The concept is simple: all posts must be limited to 140 characters maximum. Despite it’s simple concept, the site sure has grown. The simple idea of Twitter has allowed it
The threat landscape has never been more extensive. In the past, security threats were limited to minor attacks that would cause a small amount of damage to a business. As
In what will be our final chapter of our ‘Introduction to VPN’ course, I will tell you something beyond the usual tech jabber on VPN. I’ll cover some technical and
This month, Google is phasing out support for its Chrome browser on OS X 10.6 (Snow Leopard), 10.7 (Lion), and 10.8 (Mountain Lion). They are also phasing out support for
The story behind the post is plain and simple: yet another bad guy or a group of bag guys have decided to spread their malicious browser extension using Facebook. While
The biggest data breach in history happened when Mossack Fonseca papers fell into the hands of German journalists. The leaked a 2.6 terabyte archive that included 11.5 million documents —
Typically we don’t cheer bugs. However, today we’ll make an exception. You see a bug or flaw in the code of Petya ransomware has allowed a developer to create a
In the first months of 2016 a number of European countries have stated that Facebook is behaving irresponsible when it comes to users’ privacy. Facebook disagrees. In the beginning of