Say “Cheese” to your Google Chrome
A newly discovered vulnerability in a popular browser exposes how photos can be taken of unsuspecting users. Further proof of hackers’ inventiveness appeared last week in the form of a
1200 articles
A newly discovered vulnerability in a popular browser exposes how photos can be taken of unsuspecting users. Further proof of hackers’ inventiveness appeared last week in the form of a
In late 2011, it emerged that Chinese hackers had thoroughly compromised the United States Chamber of Commerce, perforating the lobbying-group’s networks with a devastating chain of backdoors. Chamber officials admitted
It’s harder and harder to keep your personal information private when browsing the web, but fortunately there is an entire market of add-on utilities, known as plugins, designed to keep
Father’s Day is fast approaching, which means finding the perfect gift for dad should be at the top of your to do list. And if you’ve had your eye on
Security professionals and enthusiasts are aware of rootkits, but general audiences typically don’t know about this kind of malware, which is specifically designed to hide itself and its activity in
APT stands for advanced persistent threat. It became famous following a New York Times exposé detailing a month’s long attack campaign in which a Chinese military unit now known as
If Achilles’s heel was his vulnerability in the Iliad, then Paris’s poison tipped arrow was the exploit. Quite literally, an exploit is the device or – more often than not
We recently wrote about the conspicuous lack of privacy discussion at Google’s recent I/O Conference in San Francisco. While it’s true that there wasn’t much talk of privacy at the
The owners of smartphones running Android and iOS sometimes enter into heated discussions as to whether it’s worthwhile to perform the mysterious procedures known as rooting and jailbreaking their devices.
Everybody talks about HTTPS and being careful with credit or debit cards online, but what makes you think your cards are safe offline? I can’t speak for anyone other than
Computers, initially created for military cipher breaking, give everyone an almost perfect way to keep our secrets totally private – through encryption. For a long time strong encryption was only
Getting to the bottom of independent AV comparative testing – who to believe and how to make the right decision. We respect the right of any user to choose a
Permanent deletion by default after a predetermined amount of time is the gimmick that drove Snapchat users to upload more than 150 million photos a day in April. Problematically, Snapchat’s
Given the deftness of malicious hackers, the bar-lowering impact of easily accessible markets for automated cybercriminal kits, and the increasing number of online services and people connected to the Internet,
If we really wanted to thoroughly discuss ‘HTTPS’ and Digital Certificates, then we’d need to talk about cryptography, but don’t worry, because we’re going to go ahead and spare you
Virtual Private Networks, or VPNs for short, have become increasingly essential of late as we more often access sensitive data from remote locations — and as the threat of having our
The general public should be well aware at this point that identity theft is increasingly common and has calamitous effects that are far more serious than the half-baked Melissa McCarthy
“Snapchat is a new way to share moments with friends,” reads the opening sentence of the temporary photo-sharing application’s “about us” page. The description is just vague enough to technically
We’re increasingly conducting our online lives through our mobile devices, be they smartphones or tablets, and while that’s a good thing for convenience, it comes with a price. Mobile platforms
Is Google’s wildly popular Gmail email service safe for work? The short answer is yes, for most of us at least, but there are circumstances in which Gmail is not