Children are crazy about tablets but it is important to set limitations in order to prevent it from becoming a real obsession. Here are a couple of tips to help you tame your chil...
In this Talk Security podcast, Threatpost's Chris Brook and Brian Donohue discuss the move to encrypt the Web, the Regin APT campaign and more.
Let’s take a moment to discuss why people tend to skip updating and upgrading their security solutions, and why this is detrimental.
A new APT campaign called Regin targets the usual victims plus a prestigious cryptographer and the GSM standard on which most cellular communications occur.
Let's take a moment to discuss the numerous troubles that our bright, technology-packed future could bring about.
Recent news concerning “hacked webcams” or “breached baby monitors” appears to be all over the place. Let's take a closer look at the situation.
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we list the low scorers.
By default, your iPhone’s OS is set to give you the best performance instead of the best battery life. But you can change that!
The first five victims of Stuxnet were deliberately selected by the attackers and allowed to execute an attack on the uranium enrichment plant in Netenz.
This is how a seemingly simple SIM card in your smartphone can contribute to the loss of money and personal data.