One simple Android game can get as much information about the smartphone’s owner as a real spy can.
”Dear Chairman, dear Vice Chairman, dear members of the board, let me present to you the annual report… Oops… Just a moment, we are having some technical issues…”
Phishing is the most developed form of Internet scamming. Let’s explore the topic in order to better understand why it became so prominent and what measures one can take to avoid ...
Even when your iPhone is in your hands or on the table, it can reveal some of your secrets to strangers. Here are 10 tips to prevent this from happening.
With the release of iOS 8, Apple claims it can’t access the personal data on your iPhones and iPads and it can’t give it to authorities. But it seems there’s a catch.
A new poll shows Americans care overwhelmingly about digital privacy.
The final month of summer wasn’t full of cybercriminal stories, but law enforcement groups around the world still found and punished some evildoers.
Tor is an online browsing portal that keeps your web activity completely anonymous.
A survey reveals the motivations behind hacker attacks, showing that they are not afraid of consequences.
On September 9th, Apple showed some new devices and its own payment system, which utilizes an NFC chip, Touch ID sensor and Passbook app. So we had a try to find out how it works,...