Cyberfun with flags
Twice a year, we ask people from all over the world about a variety of things, all having to do with one huge topic: the Internet. We process all of
1401 articles
Twice a year, we ask people from all over the world about a variety of things, all having to do with one huge topic: the Internet. We process all of
Apple iPhone and iPad users usually believe they are safe. There’s no malware for iOS, they say. Apple does little to discourage the impression — the “fruit company” doesn’t even
For several years the biggest smartphone developer, Samsung, has been heavily promoting the Tizen operating system. This experiment began in 2013, when the market saw two new Samsung cameras that
You might’ve noticed that we are fond of theft by ATM. No, we don’t hack them ourselves, but whenever someone else does, we jump right on the case. At SAS
One soldier does not make a battle, especially in the world of cybercrime, where hidden dangers lurk in the depths of the darknet and occasionally appear topside. There are a
At this time of year, the number of tax scams reaches a peak, with fraudsters looking for any chance to cash in on consumers, the self-employed, and small businesses that
1. What is a VPN? From Wikipedia’s current definition: “A virtual private network (VPN) is a virtualized extension of a private network across a public network such as the Internet.”
A long time ago, in the prehistoric digital era, in a world of big trees while we were a mere bonsai, we started throwing a yearly conference for a select
Modern smartphones have way more memory than desktop computers had a decade ago. Out of space? Why bother deleting anything when you can just replace your old 64GB memory card
Main Findings The rapid growth in the use of applications has significantly added to the digital clutter that exists on people’s digital devices: for example, users typically install 12 Android
Calling Captain Obvious…come in, Captain Obvious: Which IT threat brings the most danger to enterprises, SMBs, governments, and individuals? The answer, of course, is data breaches. Now: Which data breaches are
Password management is one of the most essential and yet probably the most annoying of security measures. Short passwords are easy to remember, but they’re insecure; long and strong passwords
It’s the small things in life — delicious tea in your favorite mug, comfortable shoes, a flower on the window seat, and … the Kaspersky Protection browser extension. We’ve already discussed its
We’ve written about insecure fingerprint sensors and other biometric technologies a lot. We were not alone, of course. It looks like the fuss did some good. At Mobile World Congress
Last week, a coworker shared an interesting article with me from the BBC. It reported that Germans were being told to destroy a connected children’s toy because of hacking concerns.
And now, boys and girls, woo-hoo! Today is a day when woo-hoo’ing seems the most appropriate thing to do. Like this: WOO-HOO!!! Why, you say? We’ve officially launched our very
In the movie Dude, Where’s My Car? (2000), viewers follow the humorous tale of two guys who partied a bit too hard trying to remember where they parked their car. We’ve all
We keep talking (and talking, and talking) about passwords. Having strong passwords for all accounts is really a must: Our recent study shows that one in five users has experienced attempts to hack their accounts —
In the face of malware, Android has a very good defense mechanism — the app permissions system. This system defines a set of actions an app is allowed (or not
One day in May 2016, Marion, a computer user from Germany, logged on to her home computer. She had no idea what lay in store for her. The first sign