Why we should pay more attention to our Download folder
How many files have you got resting in your computer’s download folder? It’s normal that it gets filled with installation apps form all the different…
Google to offer rewards to users who follow its security advice
Even though it’s for our own good, we are still struggling to follow classic security recommendations when surfing the Internet. We know how to create…
10 cybersecurity basics that every business should tell its employees
As much as a company wants to protect its confidential information, the reality is that it’s usually the employees who shoulder most of the responsibility.…
10 memory tricks for creating safe and easy-to-remember passwords
You’re probably sick of hearing how important it is to follow certain steps when creating passwords, but we assure you that it really is vital…
‘Locky’. How it works
We don’t know if you’ve heard of the new Ransomware which is called ‘Locky’… It works as follows: It arrives by mail and the attachment is…
10 Tips to Prevent Phishing Attacks
As you know, phishing is a technique that involves tricking the user to steal confidential information , passwords, etc, into thinking you are a confidential site. So far…
Honey, they’ve hacked the TV: The security callenges facing Smart TVs.
If Facebook and many more Internet platforms are capable of showing personalized ads on your computer according to your online behavior, why shouldn’t the same…