As a student, I had a part-time job offering PC support services. Now, when visiting relatives who aren't good at servicing their computers, I often have to apply my expertise onc...
One morning when I was in a hurry to get to work, everything went wrong in an instant: an SMS message alerted me to an $80 charge to my credit card for a purchase that I never mad...
The owners of certain expensive cars can analyze their driving skills in the same way F1 pilots do. However, this information is sensitive and, thus, should be protected.
Almost three dozen computers are required by Ferrari engineers to analyze everything happening with a racecar and decide on the maintenance. However, there are other computers in ...
What changed in Sochi since Olympic games? Does infrastructure suit Grand Prix? Let's find out together.
We have bought our very own Blackphone to check its security firsthand.
Data breaches have become a routine. It can happen to any site, any day. You can’t prevent it, but there is a way to minimize the damage.
Your iPhone runs hidden monitoring services. Who uses them, and for what purpose?
A new version of file-encrypting malware hides its sever inside an anonymous TOR network, making it safer for criminals to extort money from victims.
Criminals invented Cryptolocker, spying malware and Zeus banking Trojan. We have new protection against them.