iphone history

iPhone Security Through The Years

From its then-revolutionary touchscreen interface to the somewhat ill-fated Siri voice control, Apple’s iPhone has always set the standard for mobile devices since its first versi...
java script

Java: Handle With Care

Software vulnerabilities are published every day, by the hundreds, and most users don’t think much about them, aside from them time it takes them to update their software. B...
twitter

Protect Your Twitter Account

Twitter is an essential part of anyone’s brand these days, whether you’re a small company, a media mogul or someone who simply likes to share her views with anyone willing to list...
hacker

How Attackers Actually Steal Data

Most people are aware that there is a seemingly infinite sea of hackers out there whose goal in life is to steal sensitive data from corporate networks. And while tomes have been ...
Kaspersky Volcanic Expedition

Kaspersky 7 Volcanoes Expedition

Climbing the highest volcanoes on every continent alone, without any backup is definitely not for the faint-hearted! You’d have to be bold, spirited…and just a little bit crazy. B...
google

10 Ways to Manage Privacy in Google+

Google’s social networking site, Google+, continues to grow in popularity. But as with all social media sites, over-sharing your personal information is easy to do on Google+. Use...
mobile device

5 Ways to Secure your New Mobile Device

It’s that time of year when, in the afterglow of the holiday season we start to play with all of our new toys. For a lot of people that will mean breaking in their new mobile devi...
secure

5 Ways to Protect Your New Computer

You probably hadn’t even thrown away the wrapping paper and upgraded from pajamas to pants before you were knee-deep in your new computer (probably a laptop of one brand or anothe...