Key Account: How Yahoo hopes to do away with passwords
For all we know about creating secure passwords, it’s still a pain that practically every service we use requires one – they’re easy to forget…
6 steps to make your Viber more secure
Thanks to the advent of smartphones, we no longer have to worry about going over our message limit, or sending the same message to different…
The goal of early cyber threat detection
The early detection of cyber threats has long been one of the biggest goals for the IT security sector. The rapid evolution of the different…
Voice assistants like Siri and Google Now could be vulnerable to attack
Virtual voice assistants such as Siri and Google Now detect key words when you ask them questions so as to understand and be able to…
How to stop your child from downloading inappropriate apps
There can’t be a parent in the world who doesn’t know the beauty of a happy, entertained child. Unfortunately, parents can’t always play the role…
How to avoid disaster in the event of credit card theft
When it comes to choosing PINs for your credit card and cellphone you’ve done everything right – you avoided the temptation to use the year…
USB Killer: the storage tool that destroys your computer
Despite the increase in the storage of files and documents on cloud-based systems, the humble USB is still playing an integral part in our lives.…