
Déjà vu change your Spotify password… Again
We know that our drumming on the importance of changing your passwords frequently can seem like overkill to many of our readers. However, to help prove the importance of this,
3363 articles
We know that our drumming on the importance of changing your passwords frequently can seem like overkill to many of our readers. However, to help prove the importance of this,
Curios fact: in the United States the transition of merchants to EMV cards (popularly known as chip-and-pin cards), which has the purpose of fighting fraud, is actually driving fraud losses
Saint Petersburg photographer Egor Tsvetkov recently published a photo project, created with the help of a service called FindFace. He turned the public’s attention to the website and accidentally awoke
Unless you are from Russia, you probably haven’t heard of a service, that analyzes an image of a person and finds their account in VK.com social network. It’s called FindFace.
In the morning of April 5, 2016 a number of American radio stations treated their listeners to quite the unusual broadcast. Over the course of 90 minutes, the hosts discussed
Recently, Microsoft debuted a new, shiny update to their ancient crash screen, affectionately labelled the ‘blue screen of death’ (BSOD) by techies everywhere. This updated version brings some much needed
Let’s start with where the word ‘captcha’ came from. It turns out that captcha is an acronym for Completely Automated Public Turing test to tell Computers and Humans Apart. The
Today information is currency. Data is bought and sold, stolen and changed, and of course, gathered. If you want to know something about somebody you can find a real bunch
The concept is simple: all posts must be limited to 140 characters maximum. Despite it’s simple concept, the site sure has grown. The simple idea of Twitter has allowed it
The threat landscape has never been more extensive. In the past, security threats were limited to minor attacks that would cause a small amount of damage to a business. As
In what will be our final chapter of our ‘Introduction to VPN’ course, I will tell you something beyond the usual tech jabber on VPN. I’ll cover some technical and
This month, Google is phasing out support for its Chrome browser on OS X 10.6 (Snow Leopard), 10.7 (Lion), and 10.8 (Mountain Lion). They are also phasing out support for
The story behind the post is plain and simple: yet another bad guy or a group of bag guys have decided to spread their malicious browser extension using Facebook. While
The biggest data breach in history happened when Mossack Fonseca papers fell into the hands of German journalists. The leaked a 2.6 terabyte archive that included 11.5 million documents —
Typically we don’t cheer bugs. However, today we’ll make an exception. You see a bug or flaw in the code of Petya ransomware has allowed a developer to create a
In the first months of 2016 a number of European countries have stated that Facebook is behaving irresponsible when it comes to users’ privacy. Facebook disagrees. In the beginning of
Ad banners can show false and even dangerous information, launch noisy videos without permission and consume a lot of traffic. If you use mobile connection, viewing ads can be a
There is and always has been an inherent tension between an individual’s right to data privacy and wider security concerns. This is unlikely to change, although the priority may shift
Everyone from citizens to corporations to special services and government organizations is fed up with ransomware. With all of the potential victims, the United States and Canada released a joint
Over the years, the number of cyberattacks have been constantly growing. But not only have they grown, they’ve become more sophisticated and harder to prevent. So many more things and
WhatsApp is one of the most popular instant messaging services in the world. The service has more than a billion users. Perhaps the biggest reason for the app’s popularity is