10 steps to have better secured email mailbox

Email is today’s essential work tool. It’s hard to imagine life without email. We use it both at work and in our personal lives. However, this fact also poses a threat to us. The number of email-related scams continues to rise, which means that if we don’t take additional steps to secure ourselves, we’ll be at risk.…

Protection against advertisements in the browser

Ads and malicious content in a web browser can be not only annoying but also dangerous for users. They can invade privacy by tracking activities, slow down computer performance, and even infect it with malicious software. Therefore, it's important to know how to protect yourself from them. Here are a few ways to enhance the security and…

Security of mobile devices

Security of mobile devices
In today's times, each of us has at least one mobile phone or some other mobile device, such as a watch or tablet. These devices are usually constantly connected to the internet, either through a cellular network or WiFi. Typically, these devices continuously transmit and store various data, which can be very valuable and often confidential. A…

System updates – the importance of regular maintenance?

System updates – the importance of regular maintenance?
System updates involve the installation of new versions or patches for the software we use on our devices. This applies primarily to computers, smartphones, tablets, and consoles. In business settings, machines with outdated firmware or servers running on the same software version for years are not uncommon. System updates can address the operating system as well as…

Malware – what is it and how to protect yourself?

Malware – what is it and how to protect yourself?
Malware is an abbreviation for the English term "malicious software," which refers to harmful programs created by cybercriminals with the intent to damage, destroy, or steal data. You have likely encountered terms such as viruses, worms, trojans, spyware, and ransomware – all of which fall under the category of malware. To begin with, let's discuss what malware…

How to recognize phishing message?

How to recognize phishing message?
We often receive email messages that are so-called phishing attempts. Phishing is a technique where scammers try to extract certain information from us, such as personal or financial data. Criminals often do this by impersonating various companies, such as courier services or banks. I frequently encounter, both in private and professional life, that people struggle to distinguish…

How to check that URL is malicious?

How to check that URL is malicious?
In today's times, each of us receives hundreds of malicious emails. This applies to both companies and private users. In the era of AI, a significant number of them do not arouse suspicion at first, which can lead to a higher percentage of clicks or logging into malicious websites. So, how can you verify whether the email…

Infected Android applications

Infected Android applications
In today's post, I would like to draw attention to the threats associated with mobile devices because we must remember that our data can be compromised not only through clicking on a link in an email and logging in or downloading an installer on a computer, Mobile phones, which everyone has nowadays, are also vulnerable to attacks.…

How to maintain privacy on the internet

How to maintain privacy on the internet
The internet is an incredible tool that most of us can't imagine living without, providing access to a vast amount of information, entertainment, communication, and services. However, using the internet exposes us to various threats to our privacy, such as tracking, profiling, phishing, identity theft, and data breaches. These threats can have negative consequences for both our…

KeepassXC Password Manager – why and how to use it

KeepassXC Password Manager – why and how to use it
In the last post, How to secure your passwords and accounts, I wrote that to maintain security online, we need to use passwords that are long, unique, and complex. I also mentioned the use of password managers, which are designed to help us securely remember passwords for all the services where we have accounts. In today's post,…