1644 posts
How to turn a pen drive into a security key for your Google account
Due to the increasing prevalence of cyber-attacks resulting in massive data leaks, it is of utmost importance that we keep our profiles under lock and…
Thunderstrike 2 – The First Firmware Virus for Mac
It seemed like this moment would never come and many times we were assured that there was no threat of a virus for Mac users……
Google, Facebook and Yahoo join forces to fight against scammers who inflate the clicks on their ads
The online advertising industry has witnessed the emergence of “invisible enemies” that pass themselves off as regular online users – the infamous bots. This network…
A problem for Human Resources – some CVs can hold your computer at ransom
Just like sending greeting cards by post, physically presenting your CV for a prospective job offer is becoming extinct. The digital world in which we…
More than 50% of malware for Android is aimed at stealing from you. Keep an eye on your pocket!
With the barrage of news about Hacking Team, the massive cyber espionage by governments, and the US intelligence raids, it might seem that cybercriminals are…
Apple ID user? Careful! There is a new phishing attack!
A few months ago we told you all about it… and it’s happening again! Be careful with the new phishing attack which is targeting Apple…
Your company should be in the cloud, but monitor who you trust with its security
Do you know where your corporate information on the cloud actually is? Although most companies already store a great part of their files on the…