Scammers claim you can earn plenty of Toncoin cryptocurrency by distributing referral links. What’s the catch?
How to tell a real photo or video from a fake, and trace its provenance.
Today we dive into note-taking apps, to-do lists, and diaries that use end-to-end encryption: privacy-focused cousins of popular apps like OneNote, Evernote, Apple’s Notes, and Google Keep.
Android fingerprint protection isn’t that reliable after all: it can be brute-forced even without a copy of your fingerprint.
Cybercriminals are distributing a Trojan stealer under the guise of a ChatGPT desktop client for Windows. We delve into the details and ways to protect yourself.
Kaspersky VPN Secure Connection is the clear winner in tests of VPN performance, privacy, and transparency carried out by the independent IT-security research institute AV-TEST, and is recognized as the institute’s “Approved Virtual Private Network Solution”.
Another modification of WhatsApp has turned out to be malicious. We explain what’s happened and how to stay protected.
The RedLine Trojan stealer spreads under the guise of cheats for popular games and posts videos on victims’ YouTube channels with a link to itself in the description.
Attackers claiming to represent Adobe online services are sending fake notifications to obtain corporate e-mail credentials.

Increased activities of children online require parental guidance, honest communication