Twitter security tips
The concept is simple: all posts must be limited to 140 characters maximum. Despite it’s simple concept, the site sure has grown. The simple idea of Twitter has allowed it
596 articles
The concept is simple: all posts must be limited to 140 characters maximum. Despite it’s simple concept, the site sure has grown. The simple idea of Twitter has allowed it
The threat landscape has never been more extensive. In the past, security threats were limited to minor attacks that would cause a small amount of damage to a business. As
In what will be our final chapter of our ‘Introduction to VPN’ course, I will tell you something beyond the usual tech jabber on VPN. I’ll cover some technical and
The biggest data breach in history happened when Mossack Fonseca papers fell into the hands of German journalists. The leaked a 2.6 terabyte archive that included 11.5 million documents —
Everyone from citizens to corporations to special services and government organizations is fed up with ransomware. With all of the potential victims, the United States and Canada released a joint
Over the years, the number of cyberattacks have been constantly growing. But not only have they grown, they’ve become more sophisticated and harder to prevent. So many more things and
Unlike the majority of social media sites, LinkedIn is business oriented and focused on networking. This allows it to stand out and has contributed to its immense popularity. However, as
How long has it been since you were last alone? Probably never! Even within the walls of your skull you’re never really alone. For enemies are everywhere — since time
Doctors and patients across the world, beware: cyberciminals have a new member of the family! Despite its young age, a one-month-old ransomware has already encrypted files in two American hospitals
As you might have noticed, a security browser extension called Kaspersky Protection is installed simultaneously with our security solutions. In this post we will explain what it does and how
In one of the previous installments of our GSM saga we mentioned an urban legend of hijacking encryption keys on the fly. It presupposes someone can clone your SIM card
When a product is built, the manufacturer typically has a lifecycle in mind in regards to how long a consumer will ideally use the device. For example smartphones are something
Since last year, there is no doubt that it’s possible to take control over a connected car remotely. Despite this, we can see zero uncontrolled cars on the streets that
This report serves as an industry benchmark to help businesses
understand the type and level of IT security threats they face.
Two-factor authentication with SMS is widely used by banking institutions. Of course, this measure works better than a mere password but it’s not unbreakable. Security specialists found out how it
In a previous post, we discussed the definition of VPN (Virtual Private Network), its purpose and various use cases. Today we will review its most prevalent implementations, and their advantages
During the 2016 RSA Conference in San Francisco, Kurt Baumgartner, Principal Security Researcher, Global Research & Analysis Team, discussed the need for the transportation industry to put some focus onto
Even if you don’t use it, it’s likely that you’ve heard of the popular microblogging site Tumblr. With its 275 million blogs, Tumblr has become a very popular social network,
Nowadays PCs are protected much better than before. The up-to-date Windows 8.1 comes with a built-in firewall and a type of anti-virus protection delivered via Defender. Browser developers continue to
When the iPhone and app store rolled out, there was a phrase that became ubiquitous to our lives becoming more connected: “There’s an app for that.” Fast-forward to 2016 and
We talk a lot about phishing and how dangerous it is. At times we feel like we may talk about it too much to where people simply say, “yeah, yeah.