iphone history

From its then-revolutionary touchscreen interface to the somewhat ill-fated Siri voice control, Apple’s iPhone has always set the standard for mobile devices since its first versi...
java script

Software vulnerabilities are published every day, by the hundreds, and most users don’t think much about them, aside from them time it takes them to update their software. B...
twitter

Twitter is an essential part of anyone’s brand these days, whether you’re a small company, a media mogul or someone who simply likes to share her views with anyone willing to list...
hacker

Most people are aware that there is a seemingly infinite sea of hackers out there whose goal in life is to steal sensitive data from corporate networks. And while tomes have been ...
Kaspersky Volcanic Expedition

Climbing the highest volcanoes on every continent alone, without any backup is definitely not for the faint-hearted! You’d have to be bold, spirited…and just a little bit crazy. B...
google

Google’s social networking site, Google+, continues to grow in popularity. But as with all social media sites, over-sharing your personal information is easy to do on Google+. Use...
mobile device

It’s that time of year when, in the afterglow of the holiday season we start to play with all of our new toys. For a lot of people that will mean breaking in their new mobile devi...
secure

You probably hadn’t even thrown away the wrapping paper and upgraded from pajamas to pants before you were knee-deep in your new computer (probably a laptop of one brand or anothe...