Have you ever wondered how a typical office would look in a decade or so? Allow us to take you on a small tour of the most interesting office concepts.
In part one of our series, we discussed tech used by bank card ‘seekers’. Today, we’ll cover how criminals carry out the most dangerous skimming processes.
New version of CTB-Locker, a ransomware that uses Tor and Bitcoin to evade detection and takedowns, should be avoided at all costs.
The top privacy data leaks in 2014 include: data breaches at Target and Home Depot, hacks of JP Morgan and Barclays banks, and leaks at Orange and Dropbox.
Researcher discovers that Progressive Snapshot tools lack any real security controls and could be exploited by attackers to hack cars.
As a student, I had a part-time job offering PC support services. Now, when visiting relatives who aren't good at servicing their computers, I often have to apply my expertise onc...
Security reporters Brian Donohue and Chris Brook discuss security and privacy headlines from the first few weeks of the new year.
What are the key differences between Kaspersky Total Security and Kaspersky Internet Security? Which is the best choice for you? Which protects better? Let’s take a closer look.
Comparing the worst passwords of 2014 with the infamous top 50 passwords from the Gawker Media breach in 2010.
If you use an ATM card, you are of interest to carders. How do these criminals act and how can you keep your bank account safe?