Top 4 dangerous file attachments
We explain what file types cybercriminals most often use to hide malware, and how to avoid getting infected.
663 articles
We explain what file types cybercriminals most often use to hide malware, and how to avoid getting infected.
No matter how good malefactors are at pretending to be the real deal, you can still spot travel phishing if you know these three simple rules.
5 quick tips for (moderately) paranoid people on how to ensure security and privacy while traveling.
In this post we explain why digital clutter can cost you your job.
The tools that can help preserve your online privacy.
Fake technical support websites and accounts in social networks pose a real danger. How to spot and avoid them.
Everyone knows that EXE files can be dangerous for computers running Windows. But it turns out that EXE files can infect macOS too.
Apps that demand access to calls and SMS messaging without good reason are being kicked off Google Play. We explain what threats might arise.
The story of a guy who just wanted to download a pirated copy of a game but got malware instead. It’s happening more and more often, and we explain why.
Things you should know about your home Internet connection: How to be sure it is safe and waste no time calling tech support.
When you’re ready to leave the privacy fever dream that is Facebook, make sure you have everything before you lock the door on your way out.
Changing passwords regularly is outdated. Use strong and unique passwords that are easy to remember instead. Here’s how to make them.
They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don’t pay! We explain how this scam works.
Why you shouldn’t open messages with e-cards from strangers, or believe that someone gave you an Amazon gift card for Christmas.
Here’s how to delete or temporarily disable your Instagram account and back up your photos if you want to take a break from the social media service.
How cybercriminals blocked Marcie’s iPhone, and how to avoid a similar fate.
Ready to delete your Twitter account? Here’s how. But you’d better back up your tweets first.
Designer Mark used the same password for all of his accounts — and lived to regret it. Here’s his story.
We discuss what public IPs are, why you might need one, and the risks involved in using them.
Banking Trojans are increasingly focused on online stores. We explain how not to become a victim of malware during the annual holiday sales.