Mastodon: yet another social network — with a difference
The decentralized Mastodon social network claims to be a different breed of social network. Here’s how it works and how to use it without compromising privacy and security.
202 articles
The decentralized Mastodon social network claims to be a different breed of social network. Here’s how it works and how to use it without compromising privacy and security.
The new school year is in session. Here are some tips for keeping your kids safe both on their devices and online.
A new school year, and a familiar headache for parents: kids’ cybersecurity. In this first post, we discuss how to protect your children’s gadgets from cyberthreats.
Some thoughts on what PC software patches should be prioritized and why.
Scammers want to steal your passwords and financial data with fake websites. But where do they host them, and how to spot a fake?
Detailed tips for those who want to make money from streaming without feeding the trolls.
What caused a mass vulnerability in VPN clients, and how to keep them working.
What settings do you need to clear before getting rid of a gadget?
Four threats you might face when using Airbnb, and tips for avoiding them.
Here’s how to set up Threads to make your profile both private and secure.
Legacy systems continue to toil away in embedded solutions, medical equipment, and precision instruments. How can the respective security risks be mitigated?
What security aspects should be top-of-mind when implementing important changes in corporate IT infrastructure?
Low-code apps lower IT costs, but boost information security risks. How to mitigate them?
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
Smart feeders were invented to make life easier for pet owners; however, their vulnerabilities threaten not only owners’ privacy, but also the health of their pets.
Get all the benefits of a VPN — not just on your phone, but on your home computer, game console and smart TV too. The easiest way is to enable the VPN feature on your home router.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
Hardware crypto wallets are effective at protecting your cryptocurrency, but they can still be stolen from. Let’s address the risks their owners need to be protected from.
What enhancements to Kaspersky Safe Kids will help parents better manage their kids’ gadgets and screen time and encourage healthy digital habits?