How to delete Automatically cookie files
File cookie - a small piece of text sent to your browser…
How to reduce weigt without losing video quality
When a video file takes up too much space on your computer…
Online fraud: 5 most common spammer tricks
Spam and phishing often go hand in hand: Fraudsters send mass mailings…
Twitter cryptocurrency scams: A hundred Elon Musks — and now Target
“We are celebrating and giving away N bitcoins to our fans! Just…
The Rotexy Trojan: banker and blocker
Recently the mobile malware Rotexy, a cross between a banking Trojan and…
App permissions in Android 8: The complete guide
These days, Android variants probably run into the thousands. That’s because every…
What do you need to do about the recent Facebook security breach?
What you need to do about the recent Facebook security breach: Nothing.…
Mobile beasts and where to find them — part four
Mobile beasts and where to find them — part one: Adware, subscribers,…
How Instagram accounts get hijacked
(Post updated on August 29; Instagram has introduced applying for verification) Instagram…
Hijacking online accounts through voicemail
Who uses voicemail these days? “No one” is probably the first response…