
Brief cheat-sheet on cloud types and their risks
Сloud technologies differ in terms of both costs and risks. What cloud type should you choose, and how should you begin your migration?
47 articles
Сloud technologies differ in terms of both costs and risks. What cloud type should you choose, and how should you begin your migration?
How authenticator apps work and what alternatives there are to Google Authenticator.
After conducting a thorough study of applications for connected cars, our experts highlighted a number of flaws of such software.
Most third-party apps for connected cars require access to your account with the manufacturer. But are they secure?
Some forged Green Pass certificates on sale on the Internet pass validation tests. However, it’s still not a good idea to buy them, and here’s why.
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
Prioritize updating the apps that keep your devices and personal data safe from cyberattacks.
More than 20 apps on Google Play that promised cool Minecraft mods turned out to be malicious.
A brief but comprehensive guide to security and privacy on the world’s most popular gaming platform.
Setting up your child’s first smartphone right will help keep them safe — and save you money.
Dave and Jeff discuss a Facebook bug, DDoS attacks, 5G, Russian hackers, and more.
Overpriced apps entice Google Play and App Store users with a free trial period, and then charge them for a paid subscription even when uninstalled.
Jeff and Dave discuss headaches caused by Tesla’s app going down, YouTube violating child privacy laws, and more.
Kaspersky researchers found malware in CamScanner, a text recognition app that was downloaded more than 100 million times from Google Play.
When the apps on your phone don’t update automatically, and you can’t find the right setting, we tell you where to look.
How a photo editor app from Google Play secretly signed up users for unwanted paid services.
In this episode, Jeff and Dave discuss getting back at telesales, the latest from CES, the Town of Salem breach, and some disturbing data sales by US telcos.
Dave and Jeff take a look at how promoting cryptocoins has backfired for two well-known celebs — and why hacked printers promoted PewDiePie.
Let’s talk about mobile malware that can empty your bank account or spy on you.