Security do’s and don’ts: Keeping weirdos aside
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
698 articles
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
Want to defeat a cybercriminal? Stay calm, be smart, and check twice. Here is a list of security rules for every smart person who cares about cybersecurity.
Vitaly Kamluk answers our readers’ questions about malware counteraction and various security issues.
Hackers and cyberspies are not something you only see at the movies. The Internet is actually crawling with weirdos and criminals who are just looking for a chance to infect your smartphone or steal your gaming account.
In the past, technologies that see through walls were only available for some governmental services. Today, the situation has changed due to technological advancements that have contributed to price decreases.
Cybercriminals frequently use spam as the primary channel to spread malware. Of course, this is something we should take care of.
How did you like it the last time you saw your friends? Did you have a nice chat with them? Or were you all only taking pictures of your meals to post them on Instagram and talking to each other on Facebook?
We have worked together with child psychologists from across the globe to put together recommendations on how to support a victim of online bullying.
Since the holiday season is upon us, we prepared a list of simple tips to help you minimize risks when renting a car abroad.
Ransomware is a huge problem nowadays, with new examples circulating on a regular basis. Learn how to protect yourself.
While surfing the Internet, children may come across web pages containing inappropriate information. IT solutions can help protect children from such content.
In the dead of the night, a guy called my Mom and said in a weary voice: “Mom, I got into an accident. I’m in trouble. I’ll pass the phone to the officer, he’ll fill you in”. Here’s what happened next.
With so many games and apps available for download on your mobile devices, it’s important to remember that not all of them are suitable for children. That’s why you should be monitoring what your kid installs.
Children who use mobile devices can be more vulnerable to cyber threats because they are free to surf the Internet at any time or place, without adult supervision.
A New York artist made an exhibition out of making a single private and anonymous cell phone call outside the scope of government spying. Here’s how he did it:
There are several ways to avoid phishing attacks on your Facebook account. The common theme in each is to be highly suspicious of any online request for your personal information
Fraudsters hacked Skype and tricked people from a contact list to send them about $5,000 over the course of a few days. Skype support, local banks and the police refused to do anything.
An airborne plane is one of the safest places on the planet. However, there are rules to abide by in order to make sure the flight is a comfortable and pleasant experience.
Cyberbullying is one of the unpleasant effects of hyper-socialization that the Internet as a whole – and social networks in particular – bring us. Learn how to protect your children from it.
Let’s talk about the dangers of cross-border payments with plastic cards and security flaws in payment systems architecture.
Many would see an aircraft just the way they see a car: should it be 15 or 20 years old, it is automatically perceived as obsolete. This reasoning is misleading.