• May 15, 2014
    Despite having more than 50 million downloads, Flappy Bird's developer abruptly took the game down from app stores. The takedown resulted in the emergence of similar apps in app stores and even auctions for devices with the app installed.
  • April 25, 2014
    Are you a digital hoarder? Unnecessary files can strain on your computer’s memory. But there are ways to rid your life of digital clutter. You can start by taking account of those things you use to access and exchange digital information.
  • April 25, 2014
    As you spend more time online—whether you’re sharing your thoughts, photos, stories, or simply browsing pages—you reveal more data than you think. Your normal browsing activities can actually become the very thing that violates your own privacy.
  • April 15, 2014
    We’ve seen 10 years of mobile malware. It’s about time we take a look at what may await us in the next 10.
  • April 14, 2014
    An average person manages at least three social media accounts, the most prominent one being Facebook. With around 829 million users, it’s no surprise that cybercriminals have taken a liking to it. With an ever-evolving interface and features, bad guys have no
  • March 14, 2014
    There are a number of popular messaging apps available for your smartphone platform, but some come with risks. Here's how to safely use messaging apps so you don't compromise your security and privacy.
  • February 24, 2014
    If you think how you’re using your mobile device is secure enough, you may want to reconsider. You may be guilty of doing things that are jeopardizing your own security every time you're on your tablet or smartphone.
  • February 24, 2014
    What you need to know about mobile privacy, and what you need to do to prevent cybercriminals from getting to the files and information on your mobile device.
  • February 15, 2014
    2013 showed that the mobile threat landscape is slowly moving beyond apps. We saw infection and attack chains that didn’t solely rely on malicious app installation, including ads, PC malware, and spear-phishing emails. 2013 proved just how many tools cybercrim