
The Fediverse: what is it, what’s it for, and how does it work?
We explain what the Fediverse is, how it works, where you can experience it today, and what to expect in the future.
We explain what the Fediverse is, how it works, where you can experience it today, and what to expect in the future.
A few words on why desktop applications based on the Electron framework should be approached with caution.
Attackers invite employees to complete fake self-evaluations to steal corporate credentials.
What tasks needlessly overload infosec experts, and how to break the curse of overtime.
Comparing user-friendly, secure alternatives to Zoom, Teams and Google Meet calling.
You’re spending way more on subscriptions than you expect. How to take control of them and save money?
Web services and apps are part and parcel of the modern learning process — both online and offline. But they’re often insecure and pose a threat to your child’s personal data. How to stay safe?
Researchers have found several spyware-infected versions of Telegram and Signal on Google Play.
Why the Windows system time can suddenly change, and how to stop it from happening.
I firmly believe that the concept of cybersecurity will soon become obsolete, and cyberimmunity will take its place.
Eugene Kaspersky
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
Have you ever come across the words Secure DNS or Private DNS in your smartphone settings and security apps? It’s best to keep this feature enabled – it has many advantages.
Received an attractive job offer from a stranger? Be careful! It could be a scam…