“Public” email address

  Use this email address to register on public forums and chat rooms, as well as to subscribe to mailing lists and other Internet services. The following tips will also help reduce the amount of spam delivered to this address. Treat a public address as a temporary one. The chances that spammers will intercept an […]

Anonymity Online

Meanwhile, the growth in the number of devices interacting with each other in the Internet of Things (IoT)

opens up additional interesting opportunities: what if an infected car drives off the road, or an infected “smart” oven continues to heat up until the normal load is exceeded? Malware of the future can make such physical damage a reality. Users have a number of misconceptions about malware: for example, many believe that signs of […]


Standard methods of infection

  So, how does infection with computer viruses or malware occur? There are several standard ways. These are links to malicious sites in emails or social media posts, visiting an infected site (known as drive-by download) and using an infected USB drive on your computer. Vulnerabilities in the operating system and applications allow attackers to […]

Hidden network

Signs of infection

  Although most malware does not leave any obvious traces, and your computer is working fine, sometimes you can still notice signs of possible infection. The very first of them is a decrease in performance, i.e. processes are slow, windows take longer to load, some random programs are running in the background. Another alarming sign […]


Spam and phishing

Spam is the electronic equivalent of a paper advertisement that is thrown into your mailbox. However, spam is not just annoying and annoying. It is dangerous, especially if it is part of phishing. Spam in huge quantities is sent by e-mail by spammers and cybercriminals, the purpose of which is: to extract money from a […]