
Keep calm and search Facebook with Google
Over the past few weeks, we’ve discussed a few areas where you should brush up on your personal privacy settings for both Facebook and Google. Chances are you read it
245 articles
Over the past few weeks, we’ve discussed a few areas where you should brush up on your personal privacy settings for both Facebook and Google. Chances are you read it
There was a time when Google was simply a search engine. Albeit one that we always knew collected a lot of data to make search results — and ads —
British scientists proved that Android devices are highly dangerous when it comes to you and your data. It’s no joke — researchers at the University of Cambridge did serious research
What if you could be sure that your kids use Internet safely while their smartphones are protected from fraud, unwanted calls and SMS? Moreover, what if you could find your
I wonder what will happen when there are no more infosec problems. Will our Threatpost.com news blog convert to a digest of kitty cats? Is this bright future feasible at
We are still in the midst of the smartphone boom. Over the past couple of years, over 50% of all mobile devices used by consumers are smartphones. In turn, this
“Three billion human lives ended on August 29, 1997. The survivors of the nuclear fire called the war Judgment Day. They lived only to face a new nightmare: the war
What a dreadful week this one has been for the infosec industry, my friends. Following an amusing week of discovering bugs, zero-days and other researcher-coveted curios, here comes the painful
We all know that cybercriminals would love to infect your PC or Laptop with a virus or trick you to install a malware. What you might not know is that
Connected devices give us access to an unlimited source of information — the Internet. They also serve as a reserve data storage for unmindful owners. Basically, the majority of smartphone
Threatpost journalists Chris Brook and Brian Donohue discuss security and privacy at Google I/O conference, the IRS and Carefirst BlueCross BlueShield Data Breach, Sections 215 of the PATRIOT Act and
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
According to a survey conducted by Kaspersky Lab and B2B International over a 12-month period, 22% of parents polled indicated that their children were affected by cyber incidents. Examples of these
For children, modern phones and tablets often serve predominantly as universal game consoles. While there are hundreds of thousands of games to choose from, not all games are suitable for children: some
Mark Zuckerberg has officially allowed dozens of popular apps to operate within the realm of his Facebook Messenger
#BionicManDiary Entry 003 – The one where I bypassed the smartphone’s password protection whereas had intended to do a completely different thing
A Trojan malware called Podec uses popular Russian social network VKontakte, and other channels, to infect Android phones. Beware: It can bypass CAPTCHA.
Kaspersky Lab created a mobile app to find a stolen or lost phone, remotely lock it, or delete sensitive data in case of device theft.
Samsung Pay is set to come out in South Korea and the U.S. this summer. The company isn’t saying much, but we tried to find out what we could about security on the platform
Let’s identify the main IT security and protection trends at MWC 2015.
Find out about the most interesting gadgets presented at the Mobile World Congress 2015 in Barcelona