It is worth revisiting what we have so far learned from the cyber attacks in the past: the security infrastructure is only as good as its weakest point, the user. But some individuals may have yet to realize this practical truth in order to wake up to the fact that they are an essential part […]
Tech Guide
Factors to consider when buying endpoint security platforms
Months never passed without the routine headlines of large corporations and/or government entities being targeted by advanced persistent attacks often attributed to lax security practices. Even the most unlikely victims – the bigwigs in the security sector – turn out vulnerable to the one thing they purport to combat. As ordinary users, we come to […]
How to disable your Android phone’s tracking features
Whether you like it or not, your phone is designed not only to run your favorite apps, but also to retain and transmit information that may contain your location data and activity history when you use those apps.
Here’s how you can use Twitter’s new tool, Curator
By the name itself, you get the impression of what it is meant to do in general. Twitter’s Curator tool is built not only for media and for entertainment users, ordinary citizens can also find a vast set of applications for the service.
How malvertising compromises ad networks
Malvertising has gotten a bit wiser these days in moving through a scheme that appears legitimate. And even reliable websites of popular media outlets and blogs have fallen victim to this kind of malicious activity.
How Facebook customizes your News Feed?
Admit it, the first thing that you spend a lot of time on when opening your Facebook account is the news feed. Why not? It’s where most of the interesting stories are streaming in and you seem to get caught up in an infinite rush of information, unless you stop scrolling down.