How to distinguish between good and dangerous free applications
It’s easy to find appealing free applications and services that, however, can hide dangers for your privacy, your [...]
Google Docs phishing: No one is safe, not even Google
Not even Google can be safe from phishing attempts. The other night, many received an email to access a shared document [...]
Dark pattern: how to recognize deceptive techniques of online businesses
We did not have a precise definition of “dark pattern,” but we were aware of the barely-within-the-law techn [...]
New Mac malware hijacks Internet traffic on compromised servers
Yes, Macs tend to be safer than a Windows PC. Among the various security measures included in the operating system is Ga [...]
Windows 10 Creators Update: Microsoft suggests you not to install the latest update
Microsoft recommends not to manually download and install the latest update to Windows 10 to less experienced users and [...]
Locky, the new ransomware hidden in the attachment of the attachment
Ransomware is an increasingly widespread and aggressive threat. We are talking about a kind of virus able to block your [...]
Online account security: how to revoke access to third-party apps
The other day somebody stole the smartphone to a friend on the bus while coming to my house. In addition to the shock an [...]
Android WiFi Hack: an actual danger
If you have an iPhone and you have updated to iOS 10.3.1 you’re safe. Every Android user has to be careful, thou. Proj [...]