Safer selfies on the way as Instagram plans two-step verification
More than 400 million selfie lovers can breathe a sigh of relief – Instagram, the social network phenomenon, has revealed that the two-step verification process…
Panda Security launches its Practical Security Guide for avoiding cyberextortion in businesses
In order to stop an organization becoming a victim of cyber extortion a combination of security technology, company policy and training are the most important…
Why we should pay more attention to our Download folder
How many files have you got resting in your computer’s download folder? It’s normal that it gets filled with installation apps form all the different…
Google to offer rewards to users who follow its security advice
Even though it’s for our own good, we are still struggling to follow classic security recommendations when surfing the Internet. We know how to create…
10 cybersecurity basics that every business should tell its employees
As much as a company wants to protect its confidential information, the reality is that it’s usually the employees who shoulder most of the responsibility.…
10 memory tricks for creating safe and easy-to-remember passwords
You’re probably sick of hearing how important it is to follow certain steps when creating passwords, but we assure you that it really is vital…
‘Locky’. How it works
We don’t know if you’ve heard of the new Ransomware which is called ‘Locky’… It works as follows: It arrives by mail and the attachment is…