The evolution of the SIM card
A SIM card, or Subscriber Identity Module is a familiar element of a mobile phone. It can be easily swapped or replaced, yet, it was not born at the same
1401 articles
A SIM card, or Subscriber Identity Module is a familiar element of a mobile phone. It can be easily swapped or replaced, yet, it was not born at the same
Everyone loves the New Year. It is a chance for everyone to celebrate another year past with friends and loved ones, look towards a fresh start with a fresh calendar
Living in a digital age means that most of the things we use are operated and/or controlled by computers. This ranges from telecom appliances to cars, from factories and energy
With the Christmas season coming to a close, it seemed as if we were ready to wrap up the keyboard and get on with the whole jolliness and mirth of
We’ve told you this time and time again: never click suspicious links, never open files received from unknown sources, always delete mail from untrusted senders. While all of these pieces
iPower, a company behind a cloud storage service for government agencies, was surprised to discover a virus lurking in one of the body cameras used by policemen. People are getting
Malware development and our attempts to fight it sometimes remind us of a deep TV series: one can trace how “characters” acquire new skills, overcome hardships and make new achievements.
The more people that use credit cards, the bigger the number of criminals is that hunt their login credentials. Online fraud is a rather easy type of crime as a
Have you recently noticed some weird suggestions on your Netflix account? Have you seen a new user under your account that you have no idea how it got there? Well,
The Internet changes from year to year and online threats develop along with the World Wide Web. So what will the cyber-nightmare of home and corporate users look like in
Quantum computers are said to be coming quite soon and will change the world forever. While that phrase would typically mean a revolution in physics and medicine, the change which
Nowadays, free public Wi-Fi is available almost everywhere in our cities. We can access the Web from the streets to the subway and buses, not to mention venues ranging from
Today a smartphone has become an integral part of our life. We constantly use phones for work, study, travel, and they are increasingly starting to know more about us than
Following recent terrorist attacks accusations against encrypted means of online communications once again became louder. However the proposed solutions could create even more problems. Governments around the world – from
Nothing says the holiday season like over-spending on toys and devices for our children. It really shows how much we care – right? Chances are, there is a toy or
Passwords have been around since the early days — in 200 B.C., the Romans used them on a day-to-day basis to organize and manage actions of military units. With the
Ransomware has become one of the most notorious cyberthreats. Once a ransomware Trojan infiltrates your system, it stealthily encrypts your files, including your valuable documents, videos and photos. This entire
There is no decent alternative to passwords, especially when it comes to protecting your email, personal finances and devices that store your personal data. That’s why it’s crucial to use
Over the past few weeks, we’ve discussed a few areas where you should brush up on your personal privacy settings for both Facebook and Google. Chances are you read it
It was last year when a new method of attack on cellular networks was discovered. It requires neither costly radio scanners nor PC powerhouses and is available to virtually anyone.
By now, you’ve probably seen a ton of advertisements, heard commercials or noticed that your local shops have flipped the switch to that most wonderful time of the year. If