
What happens when criminals hack a radio station?
In the morning of April 5, 2016 a number of American radio stations treated their listeners to quite the unusual broadcast. Over the course of 90 minutes, the hosts discussed
1402 articles
In the morning of April 5, 2016 a number of American radio stations treated their listeners to quite the unusual broadcast. Over the course of 90 minutes, the hosts discussed
Recently, Microsoft debuted a new, shiny update to their ancient crash screen, affectionately labelled the ‘blue screen of death’ (BSOD) by techies everywhere. This updated version brings some much needed
Let’s start with where the word ‘captcha’ came from. It turns out that captcha is an acronym for Completely Automated Public Turing test to tell Computers and Humans Apart. The
Today information is currency. Data is bought and sold, stolen and changed, and of course, gathered. If you want to know something about somebody you can find a real bunch
The concept is simple: all posts must be limited to 140 characters maximum. Despite it’s simple concept, the site sure has grown. The simple idea of Twitter has allowed it
The threat landscape has never been more extensive. In the past, security threats were limited to minor attacks that would cause a small amount of damage to a business. As
In what will be our final chapter of our ‘Introduction to VPN’ course, I will tell you something beyond the usual tech jabber on VPN. I’ll cover some technical and
This month, Google is phasing out support for its Chrome browser on OS X 10.6 (Snow Leopard), 10.7 (Lion), and 10.8 (Mountain Lion). They are also phasing out support for
The story behind the post is plain and simple: yet another bad guy or a group of bag guys have decided to spread their malicious browser extension using Facebook. While
The biggest data breach in history happened when Mossack Fonseca papers fell into the hands of German journalists. The leaked a 2.6 terabyte archive that included 11.5 million documents —
Typically we don’t cheer bugs. However, today we’ll make an exception. You see a bug or flaw in the code of Petya ransomware has allowed a developer to create a
In the first months of 2016 a number of European countries have stated that Facebook is behaving irresponsible when it comes to users’ privacy. Facebook disagrees. In the beginning of
There is and always has been an inherent tension between an individual’s right to data privacy and wider security concerns. This is unlikely to change, although the priority may shift
Everyone from citizens to corporations to special services and government organizations is fed up with ransomware. With all of the potential victims, the United States and Canada released a joint
WhatsApp is one of the most popular instant messaging services in the world. The service has more than a billion users. Perhaps the biggest reason for the app’s popularity is
Experience shows that even Internet old-timers fail to protect themselves from targeted hacking. As our everyday life is becoming more and more connected to the Internet and other networks, online
How long has it been since you were last alone? Probably never! Even within the walls of your skull you’re never really alone. For enemies are everywhere — since time
No matter how old you are, it’s most likely you know all about stately Wayne Manor and its billionaire owner, Bruce Wayne. If you don’t you probably have heard of
Apple iPhone users usually consider their phones as impregnable fortresses that Apple has built for them: iPhones are often said to be secure and safe, especially when compared to Android
Stop me if you have heard this before: “I am an awesome multi-tasker. I can chat, listen to the speaker and even take notes at the same time!” Chances are you
It looks like 2016 should be declared a year of ransomware, as new families and new versions are popping up every now and then like mushrooms after the rain. Ransomware