Safe Internet Messaging: Is it Fiction?
Today, regular instant messengers are hard to trust when it comes to privacy. There are, of course, safer alternatives, but are they able to substitute Skype and WhatsApp?
239 articles
Today, regular instant messengers are hard to trust when it comes to privacy. There are, of course, safer alternatives, but are they able to substitute Skype and WhatsApp?
A very serious flaw has just been discovered in OpenSSL – an open-source and very popular cryptographic library, which has already incited a minor (for now) panic amongst security experts.
Even though February is the shortest month of the year, we still have plenty of top stories to share with you, keeping you in the know when it comes to
Despite recent scandals, RSA is still considered the biggest event in the security industry. It attracts the best brains, the best managers and the best influencers (although Security Analysts Summit is
On Friday, Apple released an urgent update to iOS 6 and 7. The only fix in the update is well worth bothering yourself with the update process, and doing it
The Winter Olympic Games in Sochi are set to kick-off with the Opening Ceremonies on Friday and the Russian city is now in the spotlight of the global media. Thousands
We are starting a series of articles “Small business security stories” in which executives of formally small business companies talk about the role of IT and particularly data protection in
Nowadays, quantum systems really do exist, with some of them reaching the stage of commercial sales. Quantum computers raise and answer new questions in the security field.
Gaming has been around for decades, and with all of the new advancements that have been made in technology throughout the years have come advancements in the way we game.
Almost everyone knows computers need virus protection. Knowledge about safety and privacy-friendly online behavior is much less widespread, though, and extensive media coverage of Edward Snowden’s leaks regarding U.S. government
That wireless router in your living room is essentially the hub for your entire home network. Nearly all of your devices are going to route through it and into you
Samsung, maker of handsets and all devices tech-related, has created a secure Android environment called Knox, which aims to resolve the laundry list of security problems facing IT teams as
MDM systems are often not necessary right away for companies with a small number of mobile workers, whose managers often believe their IT-department can handle it effortlessly. But a reality
A modern man cannot imagine his life without mobile devices like smartphones and tablet computers. A portable minicomputer that provides access to the Internet and offers basic features for processing
Using leased infrastructure for storing large amounts of data has been typical for several years. Leased capacities provide an advantage by allowing businesses to greatly reduce the cost of tending
Part two. The first part is available here. Risks associated with the vulnerabilities Bluebox reported that the vulnerabilities could be used to attain root rights in the system providing
Protecting our identities and finances online is hard enough as is, but it’s even harder when you’re trying to relax on vacation in an unfamiliar place – particularly if that
For many, summer vacations used to mean leaving all the trappings of home behind. But now that we’re more inseparable from our devices than ever before, we never leave everything
The popular microblogging website, Tumblr, announced a breach in its security for iOS customers last week. The company asked all users of its iPhone and iPad app to change their
The summer months are here and that means it’s vacation season. Whether you’re booking a weekend getaway to the nearest beach or traveling overseas to visit an unexplored country, your
Blockbusters, like Star Wars or Independence Day, tell us breathtaking stories in which space blasters, force fields and traveling faster than the speed of light are all commonplace. But there