Never post tickets with barcodes online!
Security experts and media pundits warn people to avoid posting pictures of their tickets online. Many people follow this rule, but not everyone. Time and time again and again, and again, we see photos of
1118 articles
Security experts and media pundits warn people to avoid posting pictures of their tickets online. Many people follow this rule, but not everyone. Time and time again and again, and again, we see photos of
It’s no secret: ransomware is a painful threat. And it’s not going to disappear anytime soon — with a few exceptions, of course. Good news: This is the story of one
As you probably know, modern apps often spy on users — at least to the extent of tracking their locations. If your privacy matters to you and you use an
Facial recognition technology is a powerful tool that can be used for good or evil. In this post, we present 10 positive aims fulfilled with the help of this technology.
Last week Facebook posted a video of its solar-powered Aquila drone’s inaugural flight. The aircraft’s design is of flying wing type, with a wingspan close to that of Boeing 737, covered with solar panels.
You scroll through profiles on a dating site and you see a nice girl who you might like to date. You can send her a message — and she’ll answer
Airports offer a lot of time for reflection. When you travel for business, you are often alone, so you have lots of time to sit and reflect on the meetings
The surest way to prevent your webcam from transmitting images or video is to cover its lens. Lots of security-minded folks do just that, having read scary stories about malware
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges?
Almost every cyberattack has the same goal — stealing someone’s money. However, as a vast variety of equipment is getting connected, a buggy device can lead to more serious consequences than
We truly hope that you keep in mind the risks of public charging spots. But what about users who are always on the road or spend a lot of time away from
Picture this irritating scenario: You are installing an update for Notepad++, Yahoo Messenger, or WinRAR and your antivirus pipes up to warn you the software is malware. You know that
Everyone likes Twitter. Well, okay, maybe not everyone, but at least 310 million users visit the microblogging platform monthly. And now these 310 million have to consider changing their Twitter password. This
Starting on June 10, many people will be tuning into Euro 2016 football championship and trying to consume as much info as they can. Much like many other large sporting
A recent story suggests Google is secretly recording your conversations and discussions. Although the story does have merit, it also has some problems. Google is recording voices; that’s entirely true. However, it
Like the invention of the fire pit, the history of the first password is lost to the depths of time. We know that Romans used them. Shakespeare mentioned passwords in The Tragedy
Chances are that if you used Myspace or Tumblr, you may be in for something of a headache. You see, it’s been reported that both social networks have had troves
Chances are that each of us has found ourselves in a situation where our phone is dying and we have no charger on hand, but at the same time we
Unlike previous malware trends that have varying purposes, ransomware’s is quite simple: Get Money. With a goal like that spurring on malicious developers, it’s no wonder ransomware’s star is on
The annual Google I/O conference traditionally gathers developers to give them the sense of direction for the upcoming year. This year was no exception: The audience got some insights on
The biggest data breach in history happened when Mossack Fonseca papers fell into the hands of German journalists. The leaked a 2.6 terabyte archive that included 11.5 million documents — it’s three times