The Blue Whale Challenge is supposed to drive teenagers to suicide.
Blue Whale Challenge: Social Media Game causing Suicide?

The Blue Whale Challenge is a new online game. It originates in Russia and has allegedly already caused several teenagers to commit suicide. But is that really true? Is there really any challenge at all or is it a completely made up? Or is it just the media causing panic? Read on to find out […]

Read More →
Facial recognition for advertising: Personalised advertising could soon be standard.
Facial recognition when shopping: Advertisement targeting

Facial recognition could soon be used when you are doing your shopping. So if you go to a supermarket and see a screen with advertisements, you could see personalised advertising in the future. Read on to find out how this works and whether this is morally right. It’s nothing new that software and devices are […]

Read More →
A real mail from Google support, which warns against a fraud attempt.
Fake Google Support: Phishing mail from Google

If you get a warning from Google Support via email, you can be almost certain it’s a phishing email. Fraudsters are sending out an e-mail as if there is an issue with your Google mail account. Read our blog to find out why it is dangerous to click on the links in such emails. Everyone who […]

Read More →
Often you cannot watch Netflix movies offline.
Netflix Movies offline: Download only possible to a limited extent

For just six months you have been able to watch Netflix movies offline. But now Netflix introduces a download limitation.  Now you cannot download your favourite movies as often as you like to watch them offline. They are now restricted to a reduced amount. Read on to find out why Netflix has introduced the download […]

Read More →
This is what you’ll see if you are a victim by Wannacry
Malicious software WannaCry: Victims of the worldwide attack

Malicious software WannaCry, officially WanaCryptor 2.0, the blackmail software, which has attacked many computers at the weekend, is like an epidemic, Europol even speaks of a worldwide attack of “unprecedented scale”. On Friday, the Blackmail trojan WanaCryptor started its attack. And within a very short time, 200,000 computer systems were paralysed in more than 150 […]

Read More →
A fake virus warning is meant to persuade you to download a protection program.
Fake virus warning: Android smartphones affected by mobile phone virus

What do you do if a Fake virus alert suddenly appears on your smartphone or tablet. This is completely unexpected and out of the blue. The message says that your device is contaminated with a virus. And now you must urgently and immediately install a protection program to escape the threat. Should you download the […]

Read More →
EvilEye is here. You will get spying software by e-mail on your computer.
EvilEye spy software: Spyware pirates take over webcam by e-mail

If you get an e-mail that promises you cheap air travel, Beware! It may not necessarily mean something good. The appendix probably contains EvilEye, an espionage software. The Trojans pirate your webcam and spy on you. How the spyware gets on to your computer, how you can protect yourself from EvilEye and what it does, […]

Read More →
The Windows Creators Update provides many new features for security, data protection and gaming
Windows 10 Creators Update: Game mode and more security

The Creators Update for Windows 10 will be available for all users, but not at the same time. Microsoft distributes the update in waves. According to Microsoft, it takes some time for the update to run on all appropriate computers. And that can be days, weeks or even months. Read on to find out what […]

Read More →
Hackers are trying to blackmail Apple users. Possible 220 million Apple accounts are to be affected.
Apple blackmail: Millions of iPhone accounts are threatened by data erasure

iPhone owners should beware: There is a potential threat of blackmail for Apple users. The criminals threaten to trigger a data erasure in millions of iPhone accounts. If Apple has not yet paid the required ransom, the hackers threaten to destroy the data by means of remote erasure. What Apple says, and what you can […]

Read More →