Hot Summer Tips for Keeping the Kids Safe Online This Summer
School’s out for summer and the kids need watching. Here are some tools that can help you do the job – at least while they’re on the Internet.
1118 articles
School’s out for summer and the kids need watching. Here are some tools that can help you do the job – at least while they’re on the Internet.
If it is absolutely necessary that you check your email and the only way to do it is on a public computer, forward your email to a disposable email account like Mailinotor or Trashmail that has a short life and a timed expiration.
Know your sysadmin and what to expect from him. Don’t forget to congratulate the guy, today is Global Sysadmin day!
You are probably already aware of recent cybercriminal development, namely encrypting ransomware. This kind of malware doesn’t try to hide from users; instead, a locker encrypts user’s documents using strong
Most free apps are not actually free. They monetize on displaying ads to you ― and sometimes it is very annoying.
Igor Soumenkov, a Kaspersky Lab contributor to the Ubisoft’s Watch Dogs script assessment, explains how close to real life the game world is.
Wireless networks are often insecure, and are notorious havens for attackers, who hang out in coffee shops, hotel swimming pools and anywhere else people congregate to the closest Internet connection, as they are easy targets to breach systems anonymously and steal personal data.
Making a case for password reuse, Google hiring hackers to fix the Internet, Apple bolsters security across its services with strong Crypto, plus various fixes and more.
Any new technology can be rough around the edges. The consequences can be complex and there’s high chance for human error, especially when it comes to security.
As ISPs push to make Wi-Fi more widely available outside the home, users are increasingly vulnerable to attacks that rely on rogue and malicious hotspots
If you think that threat isn’t real, ask Miss Teen USA 2013, whose webcam was hacked into and used to take nude photos of her.
These young researchers will shape cyberworld in the next decade.
Avoid becoming a victim as some of our friends did, watch your card closely.
Phishers exploit global World Cup interest with a campaign disguised as a petition to reinstate Luis Suarez. Microsoft patched 29 security vulnerabilities.
The list of highly touted devices that have been launched in recent years with embarrassing flaws – security and otherwise – is long and distinguished.
A Brazilian cybercriminal scam targeting a popular payment method known as Boletos is costing that country billions. How can you protect yourself?
Criminals invented Cryptolocker, spying malware and Zeus banking Trojan. We have new protection against them.
The first summer month brought us news about the eternal confrontation of law enforcements and cybercriminals. Let’s see who was busted in June.
New analysis pinpoints some weaknesses in a new generation of cars with online capabilities. If exploited, this may result in car theft and other problems.
Microsoft moves against a malware-supporting webhosting company, NoIP, causing collateral damage in the process. The Miniduke APT campaign returns.