Should you buy a smartphone for your kid?
Considering buying a smartphone for your kid? Here are the pros and cons, and how to choose a device.
120 articles
Considering buying a smartphone for your kid? Here are the pros and cons, and how to choose a device.
We reveal the best settings for protecting your profile from hackers, haters, and spammers.
How to protect your Instagram account and personal photos from prying eyes.
Our ICS CERT experts found 37 vulnerabilities in four VNC implementations. The developers have fixed most, but not all, of them.
Outsiders can penetrate your network through LAN sockets and devices in public areas.
Don’t use the service? Delete your account. We explain which accounts are dangerous to leave dormant — and why.
What happens if you store all data in a single cloud storage and the backup service gets attacked by ransomware?
There’s no malware in the official Android store, right? We get to the bottom of this claim.
Some employees handle lots of external e-mails, running the risk of getting hit by malicious spam. We explain how to protect company systems from possible infection.
Syrk ransomware is out, disguised as a Fortnite cheat pack. Learn what it is and how to recover your files.
Our experts tried to hack six smart gadgets for cars to find out how manufacturers protect customers.
Using persuasion instead of viruses: How scammers talk people into granting remote access to their computers.
When the apps on your phone don’t update automatically, and you can’t find the right setting, we tell you where to look.
We explain how to leave the social network while keeping some posts as a memento, even if you forgot your password and changed your phone number.
A guide on how to protect your account against spammers, hackers, and other gate-crashers.
A guide on how to disappear from Snapchat but keep the mementos you want.
We explain what file types cybercriminals most often use to hide malware, and how to avoid getting infected.
For three weeks, Baltimore’s administration has been struggling with the aftermath of a ransomware attack.
The tools that can help preserve your online privacy.