10 Best Mobile Games for Kids
Despite our dismay about too much computer in our kids’ lives, it’s a process, which cannot be stopped now. Since we cannot stop it, let’s steer it in the right direction!
87 articles
Despite our dismay about too much computer in our kids’ lives, it’s a process, which cannot be stopped now. Since we cannot stop it, let’s steer it in the right direction!
Your legitimate copy of Angry Birds 2 may be infected with malware that steals your private data. How could this happen?
The new trend on IFA 2015 is all about integrity and security. Meet Kaspersky Lab’s observations from the trade show.
A year ago, an infamous leak which exposed some celebrities’ nude photos sparked the discussion around password safety. What can you do protect your accounts?
Don’t be a slowpoke, follow Dr. House’s rule: everybody lies, especially on the Internet.
Predictability of human beings can barely be overestimated when it comes to passwords. But what about lock screen patterns, are we predictable as well when we’re creating them?
The number of vulnerable Google devices reached an all-time high since worst Android flaws ever are uncovered. There are already patches available but they may never reach end users.
Cybercriminals know how to benefit from your mobile devices. Be vigilant and follow our recommendations to secure your smartphones and tablets.
Ericsson and Qualcomm are promoting their new technology, LTE-U. Is it any better that LTE-A? And what is this combinations of letters supposed to mean, after all?
A bottle of good scotch in exchange for a day without a smartphone? Would I dare? That’s a piece of cake! That’s what I thought. As it turned out, it’s not that simple nowadays
At the recent Google I/O conference, the ‘corporation of good’ announced three projects: Soli, Jacquard, Vault and Abacus. Let’s see what those curios techs are about.
How did you like it the last time you saw your friends? Did you have a nice chat with them? Or were you all only taking pictures of your meals to post them on Instagram and talking to each other on Facebook?
At Google I/O 2015, the software giant presented a slew of new features and services. We take a first look at customizable app permissions, Android Pay, Now on Tap, and others.
Mark Zuckerberg has officially allowed dozens of popular apps to operate within the realm of Facebook Messenger.
The design of the current smartwatches is defined by being aimed at geeks. It looks like it will again take Apple to perform its duties carefully iSplaining wearables to ordinary people.
When it comes to mobile operating systems, there isn’t a conversation these days that discusses a 3rd option and doesn’t mention the need for some “true openness”. But do we really need this kind of openness?
WhatsApp has finally released a Web version of its popular mobile messaging service. We take a look at it from the security perspective.
Are you getting enough sleep at night? If not, it might be because your sleep pattern is disrupted due to the display on your PC, TV, tablet, and smartphone.
We collected the 10 best tweets related to an IT security event in 2014.
We have seen a number of cases where a user has deleted our product for Android and ended up with a locked device. Here we discuss why this happens and what can be done about it.
Let’s take a moment to discuss the numerous troubles that our bright, technology-packed future could bring about.