How safe is it to fly on an old aircraft?
Many would see an aircraft just the way they see a car: should it be 15 or 20 years old, it is automatically perceived as obsolete. This reasoning is misleading.
1168 articles
Many would see an aircraft just the way they see a car: should it be 15 or 20 years old, it is automatically perceived as obsolete. This reasoning is misleading.
WhatsApp has finally released a Web version of its popular mobile messaging service. We take a look at it from the security perspective.
The Internet continues to find its way into the private lives of its users. Here, we brief you on the most common methods of online tracking.
Banks continue to lose a lot of money because of carders and seek ways to ensure their customers are safe. Let’s take a look at the latest methods of bank card protection and how they may evolve.
In part one of our series, we discussed tech used by bank card ‘seekers’. Today, we’ll cover how criminals carry out the most dangerous skimming processes.
New version of CTB-Locker, a ransomware that uses Tor and Bitcoin to evade detection and takedowns, should be avoided at all costs.
The top privacy data leaks in 2014 include: data breaches at Target and Home Depot, hacks of JP Morgan and Barclays banks, and leaks at Orange and Dropbox.
If you use an ATM card, you are of interest to skimmers. How do these criminals act and how can you keep your bank account safe?
“British Prime Minister David Cameron to Ban Encrypted Messengers” — Headlines like this are appearing here and there. But what happened exactly?
A researcher has developed a nasty boot kit capable of taking complete control of Mac OS X devices. Here is what you need to know.
CES 2015 was a superb event in terms of the amount of new technology per square foot. But, from an information security standpoint, it did not appear all that positive.
We collected the 10 best tweets related to an IT security event in 2014.
Gaming is enormously popular. Thus, it’s an easy target for cybercriminals looking for a never-ending source of money.
On the one hand, drones are bound to violate privacy, whether on purpose or not. On the other, we’ve yet to discover and unleash their full potential.
We have constructed a list of promises that you should make to yourself this year to stay safe both online and offline.
Anyone who goes online could be hacked. During Christmas time, this possibility doubles as we make a number of purchases and get so excited that we forget about security.
A new variant of the Zeus banking trojan has emerged, targeting consumer accounts at 150 banks in 15 countries.
Everyone is afraid of hackers, phishers and other online criminals dwelling in the shadows of the Internet. But this particular story is not about the online world, instead, it is about real life, and it will teach you to always remain alert.
As you know, it is quite important to have a strong password. But what is a strong password?
One of the most highly anticipated prospects of the 21st century has been the possibility of enabling robots to drive cars. But how soon could this be possible?
Applying the incorrect settings to your router may lead to serious problems. Here is a short guide to protecting your home Wi-Fi network.