
Change your iCloud password NOW
If the rumours are true, 40 million Apple iCloud accounts have been hacked.
145 articles
If the rumours are true, 40 million Apple iCloud accounts have been hacked.
Do you have some long abandoned accounts? Do you use the same password everywhere? If so, change all of them now!
Millions of user logins for Tumblr and MySpace stolen, up for sale.
Apple SIM, Google Project Fi and, for example, GigSky are all virtual SIM cards. OK, what’s so virtual about them?
Triada is a modular mobile Trojan that actively uses root privileges to substitute system files and uses several clever methods to become almost invisible
A look at the evolution of mobile threats in 2015 and some predictions for 2016
Kaspersky Lab discovered a new banking trojan called Asacub, which had evolved from a simple phishing program into a nearly ultimate threat.
What does Google know about you and me? Let’s check it with the new “About me” tool.
Headlines raise alarm: the greatest hack in history finally reached iOS. Is that really so and who are the potential victims?
A bottle of good scotch in exchange for a day without a smartphone? Would I dare? That’s a piece of cake! That’s what I thought. As it turned out, it’s not that simple nowadays
At the recent Google I/O conference, the ‘corporation of good’ announced three projects: Soli, Jacquard, Vault and Abacus. Let’s see what those curios techs are about.
Just ten days after the remarkable Google I/O event, Apple is holding its own developers conference. Let’s take a look at the new security features.
At Google I/O 2015, the software giant presented a slew of new features and services. We take a first look at customizable app permissions, Android Pay, Now on Tap, and others.
I gather our readers have already heard about some controversial Google Glass experiences. Now, it is time to discuss the response by Microsoft, HoloLens augmented reality system.
Connection inside the aircraft is not that complex: it needs just a Wi-Fi access point. But deploying the channel on the outside is a totally different and fascinating concept.
Mark Zuckerberg has officially allowed dozens of popular apps to operate within the realm of Facebook Messenger.
A Trojan malware called Podec uses popular Russian social network VKontakte, and other channels, to infect Android phones. Beware: it can bypass CAPTCHA.
Kaspersky Lab created a mobile app to find a stolen or lost phone, remotely lock it, or delete sensitive data in case of device theft.
Samsung Pay is set to come out in South Korea and the U.S. this summer. The company isn’t saying much, but we tried to find out what we could about security on the platform.
The design of the current smartwatches is defined by being aimed at geeks. It looks like it will again take Apple to perform its duties carefully iSplaining wearables to ordinary people.
Let’s identify and discuss the main IT security and protection trends at MWC 2015.