
Is Google Authenticator irreplaceable?
How authenticator apps work and what alternatives there are to Google Authenticator.
3616 articles
How authenticator apps work and what alternatives there are to Google Authenticator.
More than a third of people polled believe that cacti absorb harmful radiation. Strong electric fields are indeed harmful, but cactus protection works very differently to how you imagined.
Episode 284 includes more on ChatGPT, pet fish playing Pokémon and more worries around AI-generated audio
The new version of Prilex malware, used to attack POS terminals, now can block NFC transactions.
We look at how secure password managers are against hacks, and how to protect your passwords as much as possible.
Information security measures are far more effective when supported by top management. How to get this support?
Episode 283 includes ChatGPT cheaters, fake news and more concerns for the crypto world
Here are a few tips on how to make your Untappd profile as private and secure as possible.
In late 2022, Apple announced a raft of new data protection features. Why does that matter to users?
Researchers have found vulnerabilities in the desktop client of the Signal messenger. Let’s see how dangerous they really are.
A new generation of chatbots creates coherent, meaningful texts. This can help out both cybercriminals and cyberdefenders.
Received an attractive job offer from a stranger? Be careful! It could be a scam…
Episode 282 includes ChatGPT malware, smart device failures and naughty chat programs
A few words about why Telegram isn’t as secure as its developers boast.
Kaspersky official blog Products for Family Security Solutions Premium protection Kaspersky Premium Complete protection for your devices, online privacy & identity Advanced protection Kaspersky Plus Combines security, performance & privacy
Why it’s important to think about what data you share online, how to prevent being doxed, and what to do if you fail.
What to do if your secret messenger isn’t secret enough.
Episode 281 includes Twitter data breach, CryptoZoo fail, Silvergate woes and much more!
Miscommunication between a business and its information security service can lead to unnecessary losses. Today we try to work out how to overcome the communication barrier.
How to know if you’re facing a scam: we identify all the red flags in a recent scam that deployed a fake cryptocurrency exchange