Charging your smartphone’s battery over USB can be dangerous
Chances are that each of us has found ourselves in a situation where our phone is dying and we have no charger on hand, but at the same time we
74 articles
Chances are that each of us has found ourselves in a situation where our phone is dying and we have no charger on hand, but at the same time we
The annual Google I/O conference traditionally gathers developers to give them the sense of direction for the upcoming year. This year was no exception: The audience got some insights on
Modern men and women can hardly imagine themselves without their mobile devices, similarly experienced Internet users won’t surf web without an ad blocker. Their popularity has risen fast: as early
Today a smartphone has become an integral part of our life. We constantly use phones for work, study, travel, and they are increasingly starting to know more about us than
Each year the number of people “addicted to Internet” grows rapidly. We can read news, communicate with friends, look through photos and videos right from our smartphones. It’s only logical,
British scientists proved that Android devices are highly dangerous when it comes to you and your data. It’s no joke — researchers at the University of Cambridge did serious research
Are you growing concerned about where exactly your children hang around after school? Or how much time they spend on their mobile phones? Or are you worried who they message
What if you could be sure that your kids use Internet safely while their smartphones are protected from fraud, unwanted calls and SMS? Moreover, what if you could find your
A worm was found in the safe garden of Apple. About 40 iOS apps are now being cleaned out of the App Store because they turned out to be infected
The new trend on IFA 2015 — a trade show for consumer electronics — is all about innovations in technological integrity. Developers chase after hardware superiority no more; instead they
While iOS is notorious for being innately secure, headlines over the past three days have challenged that. The noise was brought upon by a ‘terrible’ KeyRaider hack, which compromised more
We all know that cybercriminals would love to infect your PC or Laptop with a virus or trick you to install a malware. What you might not know is that
Recently Ericsson and Qualcomm have begun promoting their state-of-art technology, LTE-U. Is it any better that LTE-A, which is increasingly available all over the world, including US, Europe, Russia, China
I am not a gambler, and it is not too easy to lure me into a dare. Yet, I could not resist it this time. A friend posed this bet
Connected devices give us access to an unlimited source of information — the Internet. They also serve as a reserve data storage for unmindful owners. Basically, the majority of smartphone
How did you like it the last time you saw your friends? Did you have a nice chat with them? Or were you all only taking pictures of your meals
A Trojan malware called Podec uses popular Russian social network VKontakte, and other channels, to infect Android phones. Beware: It can bypass CAPTCHA.
Kaspersky Lab created a mobile app to find a stolen or lost phone, remotely lock it, or delete sensitive data in case of device theft.
Let’s identify the main IT security and protection trends at MWC 2015.
Find out about the most interesting gadgets presented at the Mobile World Congress 2015 in Barcelona
Are you getting enough sleep at night? If not, it might be because your sleep pattern is disrupted due to the display on your PC, TV, tablet, and smartphone.