Pay with Bitcoins to save a hacked phone? It’s a scam!
The Telematics Crime department of Spain’s Guardia Civil has warned of a new type of fraud which affects mobiles. This new operation consists of cybercriminals…
5 security measures that experts follow (and so should you!)
When you’re watching a movie and you see the typical computer screen filled with green coding (you know the type, rows of 1s and 0s)…
4 common errors that businesses make after a data breach
A few months ago on this blog we raised the basic points that you should think about when confronted with a cyberattack. Unfortunately the general…
The lessons we’ve learnt from the Ashley Madison leak
The shockwaves that were caused by the massive leaking of user information from the online dating site Ashley Madison can still be felt. The attack…
How can I stop people from connecting to my Wi-Fi?
Paying for a fast and reliable Wi-Fi connection at home only to find out that your neighbor is stealing the signal from you is pretty…
10 careless errors that we keep making in IT security
You have read and reread numerous lists with tips on how to browse online safely, make online purchases, avoid your most intimate photos ending up…
How to turn a pen drive into a security key for your Google account
Due to the increasing prevalence of cyber-attacks resulting in massive data leaks, it is of utmost importance that we keep our profiles under lock and…