
IT trends and cybersecurity in 2023
What security aspects should be top-of-mind when implementing important changes in corporate IT infrastructure?
31 articles
What security aspects should be top-of-mind when implementing important changes in corporate IT infrastructure?
Low-code apps lower IT costs, but boost information security risks. How to mitigate them?
A recent study shows that even “clean” Android smartphones collect a lot of information about their owners.
If you don’t want to pay for extra gigabytes in iCloud, try these other ways to backup your photos and other iPhone files.
In this episode, Dave and Jeff plus some special guests talk travel and keeping your data safe.
On this podcast, special guest David Emm joins David to talk data privacy, AI, and smart homes
Do border agents have the right to search your devices? How can you protect your data from searches at the border? We have 11 tips covering this topic.
Do you use NAS for backup? We’ll tell you how to protect it from new threats
Some habits, at first glance, seem to have nothing at all to do with security. However, looks can be deceiving.
The amount of personal data leaked by companies that store or process it has been growing at an alarming rate over the past few years. Yahoo’s record-breaking 2016 data breach
1. Make backups on a regular basis. 2. Make backups on a regular basis. 3. Make backups on a regular basis. 4. Make backups on a regular basis. 5. Make
Nowadays the proverb “the walls have ears” is not as metaphoric as it used to be. “The telescreen received and transmitted simultaneously. Any sound that Winston made, above the level
You’ve probably heard the word botnet more than once recently, and that’s hardly surprising. Any connected device can be zombified — turned into a part of a botnet. These include PCs, smartphones,
Our bionic man, Evgeny Chereshnev, had a chance to speak at a TedX event in Kazan. During his 17-minute talk, he discussed what he has learned from having a biochip
For centuries, advertising was fundamentally unidirectional. A company blasted out advertising and the public — actually, not a very predictable portion of the public — received it. That’s still the
Last week Facebook posted a video of its solar-powered Aquila drone’s inaugural flight. The aircraft’s design is of flying wing type, with a wingspan close to that of Boeing 737, covered with solar panels.
You scroll through profiles on a dating site and you see a nice girl who you might like to date. You can send her a message — and she’ll answer
Doctors and patients across the world, beware: cyberciminals have a new member of the family! Despite its young age, a one-month-old ransomware has already encrypted files in two American hospitals
Today a smartphone has become an integral part of our life. We constantly use phones for work, study, travel, and they are increasingly starting to know more about us than we
Ransomware has become one of the most notorious cyberthreats. Once a ransomware Trojan infiltrates your system, it stealthily encrypts your files, including your valuable documents, videos and photos. This entire