
Security do’s and don’ts: Keeping weirdos aside
How much time do you spend scrolling through your friends pages on Facebook? You can obviously tell a lot about their lifestyle and pastime thanks to all those check-ins, selfies
687 articles
How much time do you spend scrolling through your friends pages on Facebook? You can obviously tell a lot about their lifestyle and pastime thanks to all those check-ins, selfies
You already know that your game accounts can attract cybercriminals just like the banking credentials of your parents. The Internet can be a dangerous place for those who don’t care about security.
So you think hackers and cyberspies are something you only see at the cinema? Think again! The Internet is crawling with weirdos and criminals who are just looking for a
In the beginning of 2015, USA Today launched a wave of publications on a handheld radar called RANGE-R that has been used by the U.S. police and other government services. The radar system
Unwanted email has long stopped being just a source of advertising services or products. The time it takes to erase all spam messages from your inbox is not the only
How did you like it the last time you saw your friends? Did you have a nice chat with them? Or were you all only taking pictures of your meals
Cyberbullying, bullying that takes place using digital technology, has become a serious issue. One of four child between the ages of 12 and 17 has experienced cyberbullying in one form
People are fond of completely different vacation styles: while some prefer to strategically limit the movements to the walkway from a beach to a hotel bar, others would be happy
Ransomware is a kind of malware that steals users’ files and exacts a ransom from its victims. The most effective approach is to encrypt the files and offer decryption keys
According to a survey conducted by Kaspersky Lab and B2B International over a 12-month period, 22% of parents polled indicated that their children were affected by cyber incidents. Examples of these
Hello there! Usually, I write about topics concerning technical support or problem-solving, but not this time – though it will be relevant to the cybersecurity world. Today’s post concerns phone fraud.
For children, modern phones and tablets often serve predominantly as universal game consoles. While there are hundreds of thousands of games to choose from, not all games are suitable for children: some
Fraudsters hacked Skype and tricked people from a contact list to send them about $5,000 over the course of a few days. Skype support, local banks and the police refused to do anything.
Kaspersky Lab created a mobile app to find a stolen or lost phone, remotely lock it, or delete sensitive data in case of device theft.
An airborne plane is one of the safest places on the planet. However, there are rules to abide by in order to make sure the flight is a comfortable and pleasant experience.
Cyberbullying is one of the unpleasant effects of hyper-socialization that the Internet as a whole – and social networks in particular – bring us. Learn how to protect your children from it.
Let’s talk about the dangers of cross-border payments with plastic cards and security flaws in payment systems architecture.
Many would see an aircraft just the way they see a car: should it be 15 or 20 years old, it is automatically perceived as obsolete. This reasoning is misleading.
The Internet continues to find its way into the private lives of its users. Here, we brief you on the most common methods of online tracking.
Whether you’re buying or selling a secondhand Apple device, you can be fooled by criminals. We have gathered tips on how to minimize your chances of being taken by such frauds.
Have you ever wondered how a typical office would look in a decade or so? Allow us to take you on a small tour of the most interesting office concepts.