steal (1)

Do people need online privacy?

Almost everyone knows computers need virus protection. Knowledge about safety and privacy-friendly online behavior is much less widespread, though, and extensive media coverage of...
router

Securely Configuring a Wireless Router

That wireless router in your living room is essentially the hub for your entire home network. Nearly all of your devices are going to route through it and into you modem in order ...
fraud

Fraudulent Apps on Apple’s App Store

You have probably already heard about the security of iOS and how Apple controls its App Store. In fact, they are doing an exceptional job since the release of iOS, blocking and f...
data_EN

Planning Your Digital Afterlife

For most of us, our digital devices are incredibly important possessions. They hold our most important personal information like photos, passwords and account info, and travel wit...
humans

Hacking Humans

Go ahead and add insulin pumps and pacemakers to the ever-expanding list of computer-like-devices that contain bugs and are therefore vulnerable to exploit. That’s right, th...
criminal

Are You A Secret Cybercriminal?

On the night of June 5, 2013 a coalition led by the FBI and Microsoft broke up a botnet of two million connected PCs that was being used by cybercriminals for various malicious pu...