
Is Google really eavesdropping on you?
A recent story suggests Google is secretly recording your conversations and discussions. Although the story does have merit, it also has some problems. Google is recording voices; that’s entirely true.
687 articles
A recent story suggests Google is secretly recording your conversations and discussions. Although the story does have merit, it also has some problems. Google is recording voices; that’s entirely true.
Having a separate PC for each member of the family is no longer a luxury. Grandma wants to check on how her Facebook friends are doing, Mom needs to shop
Analysts and researchers agree that 2016 is the year when ransomware went really big. Cybercrooks didn’t need much time to see the potential value of cryptolockers, and they readily added
As if ransomware weren’t bad enough, now it’s metastasizing: not just spreading rapidly but even picking up secondary characteristics. Take Cerber, ransomware first spotted in the wild back in February
In 2008 we had the Beijing Olympics. In 2010, everybody awaited the FIFA World Cup in South Africa. Now, the Olympics are coming to Rio de Janeiro in a few
As we’ve mentioned earlier, the creators of TeslaCrypt, the constantly evolving trojan-cryptor, have suddenly decided to stop its distribution and release a master key. A master key is a key
If you cast your minds back to the summer of 2012 then you’ll vaguely remember something about LinkedIn being hacked. Data was stolen and there were plenty of red faces
If you are aware of what ATM skimmers are — and in if you’re not, you should read this post first — you probably know how to act in order
Great news – you purchased a new iPad! Of course, you’ll want to set it up, install a number of apps and start using it on all cylinders. So, let’s
At the tail end of last month, we announced that our researchers had developed a decryption tool to beat CryptXXX ransomware and help the victims get their files back for
Social networks, online news outlets, media service providers, online shops — all of them offer high quality content, compared to the Internet of the past. To get to this quality,
Apple iPhone users are notorious for their slight indulgence towards those who prefer alternative platforms. Android is constantly under attack by malware and Trojans, they say, while iOS is immune
Listen, we’ve all been there; short on cash, recent move or staying at a friend’s home and without Wi-Fi. A quick scroll through the available networks near you show that
Let’s face it, you can’t tune into the news without hearing something about ransomware. The scourge of the Internet has seen its profile raise over the past few months as
Each day, Internet users around the world are under attack as new cyber threats are deployed by criminals. Unfortunately, many people still are not using antiviruses and firewalls at all
We know that our drumming on the importance of changing your passwords frequently can seem like overkill to many of our readers. However, to help prove the importance of this,
Saint Petersburg photographer Egor Tsvetkov recently published a photo project, created with the help of a service called FindFace. He turned the public’s attention to the website and accidentally awoke
Unless you are from Russia, you probably haven’t heard of a service, that analyzes an image of a person and finds their account in VK.com social network. It’s called FindFace.
The concept is simple: all posts must be limited to 140 characters maximum. Despite it’s simple concept, the site sure has grown. The simple idea of Twitter has allowed it
The story behind the post is plain and simple: yet another bad guy or a group of bag guys have decided to spread their malicious browser extension using Facebook. While
Typically we don’t cheer bugs. However, today we’ll make an exception. You see a bug or flaw in the code of Petya ransomware has allowed a developer to create a