We tend to think that protecting ourselves against future threats is most important. But, perhaps we need to take a step back and solve some of the major problems that we already ...
Let's take a moment to discuss the numerous troubles that our bright, technology-packed future could bring about.
Recent news concerning “hacked webcams” or “breached baby monitors” appears to be all over the place. Let's take a closer look at the situation.
The first five victims of Stuxnet were deliberately selected by the attackers and allowed to execute an attack on the uranium enrichment plant in Netenz.
This is how a seemingly simple SIM card in your smartphone can contribute to the loss of money and personal data.
One morning when I was in a hurry to get to work, everything went wrong in an instant: an SMS message alerted me to an $80 charge to my credit card for a purchase that I never mad...
Let's take a look at the security features in the new version of Mac OS X - Yosemite. Apple certainly makes a decent effort.
It’s not always easy to give general advice to Android users because the OS is so very diverse. But we have ten security tips that are relevant for almost any Android version.
Using an in-room tablet in a hotel is an easy way to share your precious private data with the whole world and make it public.
Today, users are readily spending their money on house arrest-style services similar to those used for tracking criminals. They call them fitness trackers.