Twitter security tips
The concept is simple: all posts must be limited to 140 characters maximum. Despite it’s simple concept, the site sure has grown. The simple idea of Twitter has allowed it
955 articles
The concept is simple: all posts must be limited to 140 characters maximum. Despite it’s simple concept, the site sure has grown. The simple idea of Twitter has allowed it
This month, Google is phasing out support for its Chrome browser on OS X 10.6 (Snow Leopard), 10.7 (Lion), and 10.8 (Mountain Lion). They are also phasing out support for
The story behind the post is plain and simple: yet another bad guy or a group of bag guys have decided to spread their malicious browser extension using Facebook. While
The biggest data breach in history happened when Mossack Fonseca papers fell into the hands of German journalists. The leaked a 2.6 terabyte archive that included 11.5 million documents —
Typically we don’t cheer bugs. However, today we’ll make an exception. You see a bug or flaw in the code of Petya ransomware has allowed a developer to create a
In the first months of 2016 a number of European countries have stated that Facebook is behaving irresponsible when it comes to users’ privacy. Facebook disagrees. In the beginning of
There is and always has been an inherent tension between an individual’s right to data privacy and wider security concerns. This is unlikely to change, although the priority may shift
Everyone from citizens to corporations to special services and government organizations is fed up with ransomware. With all of the potential victims, the United States and Canada released a joint
Over the years, the number of cyberattacks have been constantly growing. But not only have they grown, they’ve become more sophisticated and harder to prevent. So many more things and
WhatsApp is one of the most popular instant messaging services in the world. The service has more than a billion users. Perhaps the biggest reason for the app’s popularity is
We often look at the past and have memories of a time when our worries were smaller and our lives were simpler. But looking back over the last 20 years,
Experience shows that even Internet old-timers fail to protect themselves from targeted hacking. As our everyday life is becoming more and more connected to the Internet and other networks, online
Unlike the majority of social media sites, LinkedIn is business oriented and focused on networking. This allows it to stand out and has contributed to its immense popularity. However, as
Apple iPhone users usually consider their phones as impregnable fortresses that Apple has built for them: iPhones are often said to be secure and safe, especially when compared to Android
Stop me if you have heard this before: “I am an awesome multi-tasker. I can chat, listen to the speaker and even take notes at the same time!” Chances are you
It looks like 2016 should be declared a year of ransomware, as new families and new versions are popping up every now and then like mushrooms after the rain. Ransomware
Modern men and women can hardly imagine themselves without their mobile devices, similarly experienced Internet users won’t surf web without an ad blocker. Their popularity has risen fast: as early
In the past few years there have been a lot of discussions surrounding big data. These talks generally centered on the amazing opportunities that the technology provides. The byproduct of
We all know that our opinions on what to expose and what to conceive has changed over time. Consequently, people used specific methods to convey something private so it is
Doctors and patients across the world, beware: cyberciminals have a new member of the family! Despite its young age, a one-month-old ransomware has already encrypted files in two American hospitals
In one of the previous installments of our GSM saga we mentioned an urban legend of hijacking encryption keys on the fly. It presupposes someone can clone your SIM card