The perils of fake technical support
Fake technical support websites and accounts in social networks pose a real danger. How to spot and avoid them.
699 articles
Fake technical support websites and accounts in social networks pose a real danger. How to spot and avoid them.
Everyone knows that EXE files can be dangerous for computers running Windows. But it turns out that EXE files can infect macOS too.
Apps that demand access to calls and SMS messaging without good reason are being kicked off Google Play. We explain what threats might arise.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Things you should know about your home Internet connection: How to be sure it is safe and waste no time calling tech support.
When you’re ready to leave the privacy fever dream that is Facebook, make sure you have everything before you lock the door on your way out.
Changing passwords regularly is outdated. Use strong and unique passwords that are easy to remember instead. Here’s how to make them.
They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don’t pay! We explain how this scam works.
Why you shouldn’t open messages with e-cards from strangers, or believe that someone gave you an Amazon gift card for Christmas.
Here’s how to delete or temporarily disable your Instagram account and back up your photos if you want to take a break from the social media service.
How cybercriminals blocked Marcie’s iPhone, and how to avoid a similar fate.
Ready to delete your Twitter account? Here’s how. But you’d better back up your tweets first.
Designer Mark used the same password for all of his accounts — and lived to regret it. Here’s his story.
We discuss what public IPs are, why you might need one, and the risks involved in using them.
Banking Trojans are increasingly focused on online stores. We explain how not to become a victim of malware during the annual holiday sales.
We explain the types of malware that can take control of your device, and the dangers of multifunctional infection.
Why SMS isn’t the best choice for two-factor authentication, and what alternative types of 2FA you should consider.
Tips to protect your devices, your home network, and your privacy against cybercrime.
Freelancers are beloved targets for cybercriminals, who use phishing and malware to steal credentials and money. Here’s how to avoid their traps and stay safe.
Android lets you configure app permissions to protect your data and restrict access to dangerous functions. We explain how to do it and why.
Let’s talk about mobile malware that can empty your bank account or spy on you.