How to not break the Internet
Perhaps the most striking point about last week’s huge DDoS attack, which took down more than 80 big websites and online services, is that the criminals behind the attack accomplished
1127 articles
Perhaps the most striking point about last week’s huge DDoS attack, which took down more than 80 big websites and online services, is that the criminals behind the attack accomplished
It can be tempting to disregard software update notifications. Everything seems to be working fine. Sometimes programs behave oddly or crash after an update. And by the way, you have
In the beginning, the Internet was not terrifically user friendly — early users needed tech chops just to get online, and they had to do so over a wired, dial-up connection.
Do you like privacy? Well, let me introduce you to a new player in the encrypted messaging game: Secret Conversations. It comes from a messaging service many are already using, Facebook
Humanity is steadily getting older, which, in turn, increases the number of elderly people online. Today, almost almost 18% of Facebook users are 55 or older. We set out to learn what
We have already told you about a number of hacker groups jackpotting money from ATMs. Now you can see it with your own eyes! Our experts shot four videos of ATM hack demos.
Less than three months after Pokémon Go launched, criminals sneaked malware into Google Play to target Pokémon trainers. Our experts discovered the Trojan several days ago and immediately reported it to Google.
For centuries, advertising was fundamentally unidirectional. A company blasted out advertising and the public — actually, not a very predictable portion of the public — received it. That’s still the
When Facebook bought WhatsApp for a whopping $19 billion, there was no doubt that sooner or later the social media giant would try to recoup its money and turn WhatsApp into something
Security experts and media pundits warn people to avoid posting pictures of their tickets online. Many people follow this rule, but not everyone. Time and time again and again, and again, we see photos of
It’s no secret: ransomware is a painful threat. And it’s not going to disappear anytime soon — with a few exceptions, of course. Good news: This is the story of one
As you probably know, modern apps often spy on users — at least to the extent of tracking their locations. If your privacy matters to you and you use an
Facial recognition technology is a powerful tool that can be used for good or evil. In this post, we present 10 positive aims fulfilled with the help of this technology.
Last week Facebook posted a video of its solar-powered Aquila drone’s inaugural flight. The aircraft’s design is of flying wing type, with a wingspan close to that of Boeing 737, covered with solar panels.
You scroll through profiles on a dating site and you see a nice girl who you might like to date. You can send her a message — and she’ll answer
Airports offer a lot of time for reflection. When you travel for business, you are often alone, so you have lots of time to sit and reflect on the meetings
The surest way to prevent your webcam from transmitting images or video is to cover its lens. Lots of security-minded folks do just that, having read scary stories about malware
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges?
Almost every cyberattack has the same goal — stealing someone’s money. However, as a vast variety of equipment is getting connected, a buggy device can lead to more serious consequences than
We truly hope that you keep in mind the risks of public charging spots. But what about users who are always on the road or spend a lot of time away from
Picture this irritating scenario: You are installing an update for Notepad++, Yahoo Messenger, or WinRAR and your antivirus pipes up to warn you the software is malware. You know that