Your fingerprint could be copied and used to unblock your iPhone (but it’s not a bad thing!)
A high quality photograph is sufficient enough to reproduce a fingerprint, using various techniques, molding different materials, which could even be used later to impersonate the person. But this is not always a negative thing. Learn more!
Protect your business from malvertising: stop your employees from clicking malicious ads
Malicious advertisements, called malvertising, are capable of getting into anyone’s computers. Have you been trained on how to prevent these threats in your business environment?
My phone fell in the pool: how to revive a soaked phone
What is the first things to do with a wet phone? Whatever you do, do not attempt to dry it using heat. Forget about dryers, microwaves, ovens or other similar ideas. Learn our DIY tips and give your wet phone another lifeline.
Internet of Things in Business… the risks that come with them
In the growing Internet of Things, almost everything is connected: from fingerprint readers, to thermostat or lighting controls, to company cars, and wearable devices. The growing IoTs bring risks to companies: learn how to keep your employees safe!
Got a Free Antivirus for your Company?
In recent years the global economic situation has driven companies to sharply reduce costs. In some cases, businesses have even decided not to renew the…
Before long you’ll see HTTPS on every website
The HTTPS landscape is changing. Now, tech giants, like Google and Mozilla, have decided that each and every website must adopt this security protocol. But this isn’t always a good thing.
Tales from Ransomwhere: Spam Campaigns
The two main infection vectors for ransomware are exploits and spam emails. Let’s take a look at the spam to see how popular it is. Read more!