Why you should never reuse passwords
Designer Mark used the same password for all of his accounts — and lived to regret it. Here’s his story.
683 articles
Designer Mark used the same password for all of his accounts — and lived to regret it. Here’s his story.
We discuss what public IPs are, why you might need one, and the risks involved in using them.
Banking Trojans are increasingly focused on online stores. We explain how not to become a victim of malware during the annual holiday sales.
We explain the types of malware that can take control of your device, and the dangers of multifunctional infection.
Why SMS isn’t the best choice for two-factor authentication, and what alternative types of 2FA you should consider.
Tips to protect your devices, your home network, and your privacy against cybercrime.
Freelancers are beloved targets for cybercriminals, who use phishing and malware to steal credentials and money. Here’s how to avoid their traps and stay safe.
Android lets you configure app permissions to protect your data and restrict access to dangerous functions. We explain how to do it and why.
Let’s talk about mobile malware that can empty your bank account or spy on you.
We explain what a guest Wi-Fi network is, how to set one up, and what video game consoles and other IoT devices have to do with it.
Speaking of two-factor authentication — as we often do — did you know some convenient settings render it utterly useless? Let’s do it right.
Why doesn’t Kaspersky Lab have an antivirus app for iOS — and what are all those other Internet security suites for Apple mobile devices?
Fortnite for Android is not available on Google Play. We explain how to download and install it properly, and what else to do to stay safe.
WhatsApp for Android can back up your chats to Google Drive. It’s free, but it may hurt older backups. Here’s how to get it right.
Instagram hacking has been on the rise lately. Here’s what you need to know to avoid losing your precious account.
How a sculpture from Japan is scaring WhatsApp users around the world, and how to protect children from such spooks on the Internet.
In this part, we consider mobile malware capable of causing real damage to smartphone and tablet users.
When I fell victim to sleight of hand and a little bit of fraud, Find My iPhone didn’t save me. Here’s why.
No PIN on your phone? Pickpockets will thank you for that.
In part one of our mobile malware series, we cover infectious Android malware — adware, subscribers, and flooders — and how mobile viruses can damage your smartphone or tablet…