The subject of on-line safety was brought up on numerous occasions on our blog, however, this subject should be discussed on an ongoing basis. Dangers and consequences of an irresponsible way of using the Internet, but not only, can be really serious. Familiarise yourselves with ...

If you are an owner of Mitsubishi Outlander we don‘t have good news for you. Ken Munro, a highly appreciated specialist in automotive security accidentally has discovered a gap in security, which may help the thieves to steal a car worth over 20 000 pounds ...

Computer software can help us efficiently protect our privacy or data. We can install a variety of anti-viruses, firewalls and other apps, which protect us against attacks in the Web. Yet there still exists a threat most often procured by a human.Hackers and Internet frauds use not ...

If you like watching TV series and are deeply interested in subjects we touch on our blog, you should (unless you have already done it) turn your attention to a series titled Mr. Robot. To encourage you even more, we present 5 reasons why this ...

How to win $10000 not leaving home? Well, it‘s enough to know a bit about programming and find a bug in Facebook software. A 10-year-old Finn Jani, who found a bug in Instagram software has just got rich with this sum. The app bought by ...

Nowadays many car manufacturers offer car models that can be connected to the Internet. These cars can successfully be hacked! How can you prevent that?The hijacking test was of course done in controlled environment, the driver knew what is to be expected like deactivating the ...

Who was the first hacker? When was the term ‘hacking‘ coined, and does it really have to involve computers at all? It turns out that the concept of hacking is not a creation of the last couple of decades. Moreover, it does not even require computers ...

Almost every Internet portal requires us to sign up in order to browse through its content. The largest of portals contain millions of personal data sets, passwords, telephone numbers etc. Such a database can seem like a treat worth the effort for the hackers! Are ...

error: Content is protected !!