Blog

How to protect yourself from ransomware attacks?

NAS infrastructure is increasingly falling victim to ransomware

Recent attempts at ransomware attacks on NAS devices have not been left unanswered. Taiwanese Asustor urges its clients to take security measures to protect important data and explains how to do it. NAS infrastructure is increasingly falling victim to ransomware attacks. This is understandable – hackers know …

Three basic rules for using the flash drive safely

It is worth using the media carefully, and also secure them

Portable USB sticks are useful in both everyday and professional life. The data stored on them is often valuable and confidential. For the sake of their safety, it is worth using the media wisely and protecting them properly. Research shows that almost half of people who find …

Facebook plans to hide “likes”

The end of likes on Facebook.

We recently reported that Instagram wants to hide the number of likes, sharing this information only to the account owner. Everything indicates that Facebook will also choose to do the same. Upcoming changes on the Instagram portal caused a considerable storm among the so-called “hearts collectors“. No wonder …

Chrome will inform you of a potential password theft

Google Chrome

Google wants to help its users in data security. To this end, it will inform us of the required password change. The American giant is to work on the function of detecting password leaks. It would consist of tracking and directly checking the data we enter. If we …

The new Firefox 69 is now available

The Mozilla Firefox web browser version 69.0 is now available for download. The new build brings a lot of changes. The main one applies to users using Mac computers. The browser will consume less power on configurations equipped with two graphics cards. All thanks to automatic switching to …

Secure smartphone – 6 most important principles

Today, mobile devices are our window to the world, so you should take care of their security

Only a few years ago, cell phones were used primarily for writing SMSs and making calls. Contemporary smartphones, on the other hand, organize almost our entire life: we collect photos, access data for instant messengers, online banking services and e-mail. Under these circumstances an understandable question arises: …

The Swiss parliament opposes the blocking of pirated websites

Swiss parliament opposes the blocking of pirated websites

The Swiss parliament adopts amendments to copyright law by opposing the blocking of pirated websites. Switzerland can introduce its legislation because it does not fall under the jurisdiction of the European Union. The policy of Geneva copyright law, therefore, does not meet the standards of other …

Wi-Fi turns 20 – 20 significant moments in the history of technology

Wi-Fi as the main economic factor

In 1999, several technology companies joined forces to form the Wireless Ethernet Compatibility Alliance (WECA). On September 30, 1999, the 802.11b wireless LAN standard became available in commercial applications. This moment is considered the beginning of the existence of a wireless network, known today commonly as Wi-Fi. …