What’s a guest Wi-Fi network, and why do you need one?
We explain what a guest Wi-Fi network is, how to set one up, and what video game consoles and other IoT devices have to do with it.
68 articles
We explain what a guest Wi-Fi network is, how to set one up, and what video game consoles and other IoT devices have to do with it.
Forgotten online resources can be used for extortion or phishing
Do you take your smartphone to lunch with you? How about the shower? How addicted are you, really, to always staying online? Take this quiz and find out.
Almost half of the most-visited websites open visitors to potential dangers. What can you do?
Do you know what children look for online? The answers may surprise you.
We explain what digital certificates are, what types exist, and what problems are associated with them.
Cybercriminals weaponize hidden mining. We tell you how it works and how to protect your company
While you’re watching YouTube, someone might just be using your device to mine cryptocurrency.
The cryptomining boom is helping scammers make money out of thin air. The latest method involves fake currency and ransomware.
Many people assume that an HTTPS connection means that the site is secure. In fact, HTTPS is increasingly being used by malicious sites, especially phishing ones.
Hacked programs freely distributed online are found to be equipped with a hidden NiceHash cryptocurrency miner.
Facebook sends so many notifications that sometimes it’s tempting just to turn them off. We tell you how to do it — or how to adjust them so they don’t take over your life.
Some habits, at first glance, seem to have nothing at all to do with security. However, looks can be deceiving.
Our research shows most users of online dating sites fudge information about themselves. Why they do it and what you can do about it.
What if you could pay with your personal data for goods – as if it was some sort of currency? Sounds attractive… or scary?
Fraudsters make a fortune mining cryptocurrencies — on your computer, at your expense, and without your knowledge.
For a great majority of parents, it’s quite reasonable to worry that kids will come across inappropriate websites — or worse — while they’re playing or browsing on an iPhone
It’s true not much malware exists in the wild for MacOS or iOS. But there is some — and phishing sites, spammers, and carders don’t discriminate on the basis of
You’ve probably heard the word botnet more than once recently, and that’s hardly surprising. Any connected device can be zombified — turned into a part of a botnet. These include
Black Friday and Cyber Monday, followed by the Christmas sales are high season for cybercriminals: as you’re trying to get that shiny new TV or pair of jeans for the