In this video tutorial, we explore the Facebook settings pages, explaining what each feature does and showing users how to securely configure their profiles
Get rid of old gadgets while keeping your data secure and private.
A series of security tips and guidelines to follow if you are planning to conduct money transfers online.
Last week, we had a look at private messengers; today, we decided to compile a list of good apps to protect you, your iPhone and its content.
Today, regular instant messengers are hard to trust when it comes to privacy. There are, of course, safer alternatives, but are they able to substitute Skype and WhatsApp?
The Internet has made planning and booking a vacation easier than ever before. But beware, there are lots of scammers who are ready to pounce on unsuspecting victims booking their...
Sometimes we have no other option than to leave our things unattended. Imagine the situation: you are alone at the beach on a hot summer day and cannot resist the temptation to ju...
Cryptographic hash functions are a ubiquitous tool in computing, used for everything from identity verification to malware detection to file protection.
There is a serious flaw called Heartbleed in OpenSSL encryption library that could expose user login credentials, communications content, an more
On October 25, 2001 Microsoft launched its newest operating system solution: Windows XP. In just three days, Microsoft sold over 300,000 boxed XPs: the new OS featured a number of...