USB devices are everywhere, and they come in the form of flash drives, webcams, keyboards, and so on. One of the attractive things about USB is that you just plug in a device and it works. That convenience is nice to have, but it also presents a real danger.
Finally, a chance to put your flying skills to the test thanks to onboard Wi-Fi. But won’t the smart hacker in row 27 also be able to take control of the flight stick? The simple answer is “no”. That said, while airplane electronics are secure this may not necessarily be the case for your notebook or tablet.
Everybody uses browser extensions. We use them because, sometimes, they make our life easier on the Internet. For example, for translating, shopping or searching. In the last couple weeks, we monitored rampant spreading of browser extensions with new machinery for harming the user – via the publishing of unwanted advertisements.
Cisco researchers discovered today an exploit on Amazon.com, YouTube.com and more than 700 other websites that infects visitors via the standard advertising running on these sites. The exploit, which has been dubbed “Kyle and Stan,” is especially effective because it infects both PC and Mac users.
Before the user is able to enjoy an app, Android goes wild asking for permissions. “Either or” is the motto: If you don’t agree to every single permission request, you can’t use the app. For some apps, this can really spell trouble.
Booking vacations online is super convenient. Here are a few tips to get you started so you can enjoy your holiday from the very inception.
We had so much fun with one of the most trending topics on Twitter yesterday that we felt the need to give the “good cop” version of events. Here are some really awkward situations you might get yourself into if you don’t have an antivirus on your smartphone.
Online dating is big business: 8 million users and over 200 million euros in revenue in Germany alone show that the trend of finding true love online is clearly on the rise. We’ve put together a few tips so you can find the right person safely.
Another day, another data breach. That’s certainly what it’s felt like lately.
Do you remember the early days of Napster? Whether you’d admit it or not, you probably at least experimented with using the software to download music, and if not, then you knew someone who did. Napster opened people’s eyes in new ways to how the Internet could be used to easily get immediate access to content.