How to watch porn safely and discreetly
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
3884 articles
Hiding your guilty pleasures from prying eyes is possible, but you need to do it properly.
This week, David Jacoby joins Dave and Jeff to discuss his recent talk at SAS at Home, covidication, and more.
A look at how the near-universal shift to working from home has affected employees’ lives and attitudes toward security.
A long time ago in a galaxy far, far away, a lone Mandalorian warrior suffered from cybersecurity issues, both other people’s fault and his own.
Payment terminals and ATMs in remote locations require a special approach to security.
Kaspersky experts found the PhantomLance Trojan backdoor for Android in Google Play.
Kaspersky researchers publish a decryptor that can help get back files encrypted by all strains of Shade/Troldesh ransomware.
Dave and Jeff talk about the UK government considering the use of artificial intelligence for espionage, Google’s continued fight against COVID-19 phishing, and more Zoom headaches.
Tools and approaches to help you get some online privacy.
How scammers are exploiting delivery problems during the epidemic — and how not to fall for their tricks.
In this episode, Dave and Jeff discuss the amount of scam e-mails tied to COVID-19, Facebook’s disinformation, working remotely, and more.
MITRE tested our solutions in the APT29 evaluation. We explain what the test is, why and how it’s conducted, and what the results mean.
Is your Wi-Fi a bit wobbly? Here are some easy tips to overcome the problem.
Did you have a chance to train your employees in the basics of information security before sending them off to work from home?
How can you make your parents secure, technologically speaking? By setting up protection remotely, without visiting them.
Dave and Jeff sit down with Eugene Kaspersky to discuss life in the new “normal,” travel, running a company during COVID-19 times, and more.
Researchers found a way to create fake fingerprints to fool many devices, although it took a lot of effort.
Using services and programs that IT doesn’t know about causes problems. We explain how to avoid them.