How to pay for ‘free wifi’ with your social network account password
In theory, it’s common knowledge that “there’s no such thing as a free lunch”, but when it comes to practice, some forget about the ‘free lunch’ proverb and prefer another
94 articles
In theory, it’s common knowledge that “there’s no such thing as a free lunch”, but when it comes to practice, some forget about the ‘free lunch’ proverb and prefer another
When it comes to Mobile OSes, every 3rd option conversation these days mentions the need for some “true openness”. But do we really need this kind of openness?
WhatsApp has finally released a Web version of its popular mobile messaging service. We take a look at it from the security perspective.
Are you getting enough sleep at night? If not, it might be because your sleep pattern is disrupted due to the display on your PC, TV, tablet, and smartphone.
We collected the 10 best tweets related to an IT security event in 2014.
We have seen a number of cases where a user has deleted our product for Android and ended up with a locked device. Here we discuss why this happens and what can be done about it.
Let’s take a moment to discuss the numerous troubles that our bright, technology-packed future could bring about.
By default, your iPhone’s OS is set to give you the best performance instead of the best battery life. But you can change that!
Everyday millions of computers solve the same problem; these machines try to check if you are actually you and not some other person. The most popular tool to do that
If you haven’t heard by now, three days before Jay Z released his most recent album “Magna Carta… Holy Grail” in July, Samsung Galaxy device owners could download it via