Elderly people online: habits and concerns
Humanity is steadily getting older, which, in turn, increases the number of elderly people online. Today, almost almost 18% of Facebook users are 55 or older. We set out to
3298 articles
Humanity is steadily getting older, which, in turn, increases the number of elderly people online. Today, almost almost 18% of Facebook users are 55 or older. We set out to
We have already told you about a number of hacker groups jackpotting money from ATMs. Now you can see it with your own eyes! Our experts shot four videos of
On August 25, WhatsApp published a blog post detailing its new terms of use. These types of posts rarely generate buzz, but this post detailed end-to-end encryption, exploration of business,
Being a parent is tough in the digital age. The bullies and predators you have to worry about have expanded beyond physical threats to ones that lurk around every corner
Has the shock and awe of Yahoo’s 500 million user credential hack died down yet? Everyone breathing a bit easier? Passwords changed, dead accounts deleted? For those of you chuckling
Danger often comes from an unexpected direction. For example, while you are alert to pickpockets, criminals may be approaching invisibly, over Wi-Fi. Here’s a typical scenario: Let’s say you meet
Some unwanted software announces itself, demanding ransom, tying your computer in knots, crashing the system. By comparison, software that merely installs browser toolbars or other extras, or changes your default
I am not sure about you, but [sarcasm on] my ABSOLUTE FAVORITE THING is opening my mailbox to find unsolicited mail. You know, junk mail [sarcasm off]. Raise your hand
Yahoo is expected to announce a “massive” data breach ahead of its impending sale to Verizon. Although the news is not yet confirmed at the time of this posting (several
Today Google releases the Allo app — a new messaging app that was expected to provide a few cool features as well as privacy for its users. But the company
Researchers at Chinese security company Keen Lab claim that they have managed to remotely hack an unmodified Tesla Model S with the latest firmware installed. After one driver’s interaction with
This report is dedicated to the financial side of cybersecurity: how much businesses spend to protect themselves and to recover from a cybersecurity incident.
Security solutions must be able to perform two big functions: prevention and, if necessary, remediation. Kaspersky Lab’s latest patent is a technology that makes both more effective. The most common
In the beginning of 2012, I got a MacBook. At the time, I knew little about gadgets, and I was not planning to buy any other Apple devices. I powered
Less than three months after Pokémon Go launched, criminals sneaked malware into Google Play to target Pokémon trainers. Our experts discovered the Trojan several days ago and immediately reported it
Picture a hacker. What does he look like? Nerdy? Lives with his mom? Wears a black hoodie? Lives on pizza? Types on three computers simultaneously… constantly? OK, we’re out of
The cybersecurity industry has a fundamental insecurity: talent supply. Frost & Sullivan estimates that by the year 2020 the field of cybersecurity will see a talent shortage of 1.5 million
We’ve talked about the problems of open Wi-Fi networks a lot. Really, quite a lot. In case you’ve been living under a rock and missed it, open Wi-Fi networks are
Bitcoin, and its fundamental technology blockchain, have been popping up in the news plenty over the past few years. However, discussion about them is typically a bit high level —
We are pretty sure you have a smartphone. Right now, while you are reading this article, it’s on your table, or in your pocket, or, maybe, in your hand. You
For centuries, advertising was fundamentally unidirectional. A company blasted out advertising and the public — actually, not a very predictable portion of the public — received it. That’s still the