Zoom 5 moves toward security
Zoom developers have made their service more secure. We review what’s changed.
425 articles
Zoom developers have made their service more secure. We review what’s changed.
The dangers of pirated games, activation codes on gray-market sites, and ready-made accounts in official stores.
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
Learn how to protect your Twitch account, block spammers and haters, and make chat easy and secure.
The coronavirus outbreak has forced many office employees to remain at home. Here’s what you need to keep in mind so that both you and the company stay protected.
A brief but comprehensive guide to security and privacy on the world’s most popular gaming platform.
If you don’t want to pay for extra gigabytes in iCloud, try these other ways to backup your photos and other iPhone files.
We tell you which security and privacy settings will hold Twitter hackers and spammers at bay.
Considering buying a smartphone for your kid? Here are the pros and cons, and how to choose a device.
We reveal the best settings for protecting your profile from hackers, haters, and spammers.
Fear of the coronavirus is being leveraged by cybercriminals online to spread trojans and malware.
Setting up your child’s first smartphone right will help keep them safe — and save you money.
How to protect your Instagram account and personal photos from prying eyes.
Buzzing the White House, paralyzing airports, crashing into planes and power lines — we highlight the dangers of drones.
Criminals and troublemakers can deploy drones that harm businesses. Here’s how we arm you against this potential threat.
We analyze the fairy tale The Wolf and the Seven Young Goats in terms of cybersecurity
Folk tales are a fount of wisdom, but not many would use them to teach children the basics of information security. Well, you could!
There’s no malware in the official Android store, right? We get to the bottom of this claim.
Chrome and Firefox extensions can collect your browsing history. Learn why this is dangerous and how to protect yourself.
Some employees handle lots of external e-mails, running the risk of getting hit by malicious spam. We explain how to protect company systems from possible infection.