Rootkits are some of the most sophisticated breeds of malware that currently exist on the market. For years, security solutions have struggled with detection...
Category - Tips and Tricks
What if a hacker had front row tickets to your bedroom every evening through your laptop’s webcam? Or maybe a stranger was listening in through your...
It was a cold November night just as you would expect for that time of the year in the northern part of Romania. The office that is otherwise full with reverse...
“If you’re not paying for it, then you are the product,” reads an old proverb. This stays true to date, despite the massive move to digital. Advertising...
Handshakes have been a sign of friendship since forever. We shake hands so often throughout the day that we lose track of how many people we’ve greeted. But...
Say you used to know a Jane some years ago. If you’ve just received an email from her without having kept in touch for years, consider it suspicious and...
When you request a page, the information travels from the server to your computer via a super-highway of cables, routers and computer switches that stretch the...
Your online accounts are part of your digital identity. They’re used to store your conversations, money, search history or those cat pictures you bookmarked to...
Our retrospective of computer threats started with keyloggers and ransomware, two relatively new malware families. Now here is something only kids of the 80s...
Smartphones and computers are becoming increasingly important in our lives, changing how we chat, talk, work, study, read, shop and move around. What happens...