1644 posts
Key Account: How Yahoo hopes to do away with passwords
For all we know about creating secure passwords, it’s still a pain that practically every service we use requires one – they’re easy to forget…
The goal of early cyber threat detection
The early detection of cyber threats has long been one of the biggest goals for the IT security sector. The rapid evolution of the different…
USB Killer: the storage tool that destroys your computer
Despite the increase in the storage of files and documents on cloud-based systems, the humble USB is still playing an integral part in our lives.…
Don’t be careless when throwing away your used boarding cards!
Despite the need to print off documents having a less important role in our lives in the era of smartphones, there are still some things…
The coupon scam that’s flooding WhatsApp
If you end up getting a WhatsApp that’s offering you a coupon for a discount at the likes of Ikea or McDonald’s then you’re right…
10 Tips to Avoid Viruses on Halloween
Halloween is one of the most celebrated holidays, and cybercriminals always want to be part of it. As we get closer to Halloween, hackers…
Telecoms giant TalkTalk suffers critical data breach
When it comes to protecting the private information housed within your company’s network, it’s been proved time and again that no business can afford to…