All posts

3931 articles

Hot summer of 2012

In addition to the above examples, there were two other large scale and highly scandalous invasions in July and August of last year. The victims were users of the popular

The Price of Privacy

We always talk about the need to leave no trace of your activities on the Internet. Some folks may call us a little bit paranoid, after all, what could be

mac

A Fruity Bait

There is a common belief that Apple operating systems are well protected against cybercriminals. This belief used to be true, but Apple users are quickly becoming an attractive target for