How to find a free game while avoiding scams
Five things to keep in mind when choosing a free PC game to play.
27 articles
Five things to keep in mind when choosing a free PC game to play.
To hackers’ delight, merchant vessels that transfer about ninety percent of the world’s cargo heavily depend on automation and remote monitoring systems with poor IT security.
Fraudsters hacked Skype and tricked people from a contact list to send them about $5,000 over the course of a few days. Skype support, local banks and the police refused to do anything.
Kaspersky Lab created a mobile app to find a stolen or lost phone, remotely lock it, or delete sensitive data in case of device theft.
Let’s identify and discuss the main IT security and protection trends at MWC 2015.
New allegations against the NSA claim the group hacked into the network of the world’s largest SIM card provider, stealing encryption keys to millions of devices.
The top privacy data leaks in 2014 include: data breaches at Target and Home Depot, hacks of JP Morgan and Barclays banks, and leaks at Orange and Dropbox.
We have constructed a list of promises that you should make to yourself this year to stay safe both online and offline.
Anyone who goes online could be hacked. During Christmas time, this possibility doubles as we make a number of purchases and get so excited that we forget about security.
Let’s take a moment to discuss why people tend to skip updating and upgrading their security solutions, and why this is detrimental.
Brian Donohue and Dennis Fisher talk about a new attack on the SSL protocol, which is now known as POODLE.
The Internet has made planning and booking a vacation easier than ever before. But beware, there are lots of scammers who are ready to pounce on unsuspecting victims booking their vacations this time of year.
Face it – your life revolves around your computer. Whether it’s your family photos, work files or your personal documents, if your computer were damaged or destroyed you would be
Recent revelations about government surveillance have once more brought two-decade old PGP software into the spotlight, as it remains a quite robust and secure mechanism for communications. However, progress in
If you have been following the latest in news, you’ve probably heard a lot of stories talking about privacy, information leakage, espionage and such. Given that most of our communications
It’s officially the time of year again that brings the tricks and treats with it, and in honor of this month, which also happens to be National Cybersecurity Awareness Month,
The world has been up in arms about the expansive and invasive reach of the U.S. government’s National Security Agency (NSA) ever since the world was introduced to Edward Snowden
Even if you follow all the Cardinal Rules of system security — you regularly update your operating system and programs, avoid spam like the plague and never click through on suspicious
The popular microblogging website, Tumblr, announced a breach in its security for iOS customers last week. The company asked all users of its iPhone and iPad app to change their
Security professionals and enthusiasts are aware of rootkits, but general audiences typically don’t know about this kind of malware, which is specifically designed to hide itself and its activity in
The Internet has revolutionized the way we book our holidays. Unfortunately it is also enabling fraudsters to prey upon people’s desires to have a perfect vacation, so stay vigilant and