The holiday season is a big time for consumer electronics and smarthome gadget sales. With so many advances and innovations that we saw in the Internet of Things in 2016, there’s a likely chance that...
News broke last week that Yahoo has allowed intelligence agencies to scan user emails. This comes at a very bad time for Yahoo, right on the heels of its 500 million user account data breach—made...
Your Android phone contains a lot of sensitive data. Here's how not to lose it.
Guest post by Simon Parker, courtesy of Minerva Security Both small and large corporations are tasked with securing their networks and computer systems, particularly from intruders who want to hack into them to gain access to...
These management tips will protect your employees and customers against security incidents
As the world's population ages, how can we make sure older people can continue to use our tech products, websites, software and online services?
There are tens of thousands of Chrome extensions for virtually every need. How do you make sure they're safe and your privacy and security don't get compromised?
Surely, you've already heard about Signal the messaging app. But are you familiar with all its settings and functionality?
business applications
By Luke Fitzpatrick Hybrid cloud infrastructure allows an enterprise to split workloads between public clouds, private clouds, and on-premise resources. Reasons for doing this often include the need to split dynamic workloads from less dynamic ones so...
Man in the middle attacks. Social engineering. Large scale data breaches. Government surveillance. Device theft. Those are just some of the threats standing in your way as you try to carry on a safe digital...