Most businesses that are with the digital times have some portion of their operations online. Even if your business is not accessible via the Internet, it is likely that you use some sort of computer system to keep track of inventory, shipments, or client information. If you use computers in any capacity for your business, […]
Tech Guide
How you are aiding cyber criminals, let us count the ways
It is worth revisiting what we have so far learned from the cyber attacks in the past: the security infrastructure is only as good as its weakest point, the user. But some individuals may have yet to realize this practical truth in order to wake up to the fact that they are an essential part […]
Factors to consider when buying endpoint security platforms
Months never passed without the routine headlines of large corporations and/or government entities being targeted by advanced persistent attacks often attributed to lax security practices. Even the most unlikely victims – the bigwigs in the security sector – turn out vulnerable to the one thing they purport to combat. As ordinary users, we come to […]
How to disable your Android phone’s tracking features
Whether you like it or not, your phone is designed not only to run your favorite apps, but also to retain and transmit information that may contain your location data and activity history when you use those apps.
Here’s how you can use Twitter’s new tool, Curator
By the name itself, you get the impression of what it is meant to do in general. Twitter’s Curator tool is built not only for media and for entertainment users, ordinary citizens can also find a vast set of applications for the service.
How malvertising compromises ad networks
Malvertising has gotten a bit wiser these days in moving through a scheme that appears legitimate. And even reliable websites of popular media outlets and blogs have fallen victim to this kind of malicious activity.