Researchers Disclose New Foreshadow (L1TF) Vulnerabilities Affecting Intel CPUs
Microsoft August 2018 Patch Tuesday Fixes 60 Security Flaws, Including Two Zero-Days
Hackers Can Falsify Patient Vitals
Built-In Lazy Loading Lands in Google Chrome Canary
Microsoft Releases Windows 10 Cumulative Updates KB4343909 and KB4343897
Google Chrome Gets Insertable Emojis. Here's How to Enable Them.
360 Total Security
InsaneCrypt (desuCrypt) Decrypter
Junkware Removal Tool
Remove the Auto Speedup 2018 PUP
Remove the WhiteClick or the White Click Toolbar
Remove the Browsing Secure PUP
Remove the Smart PC Care PUP
Remove Security Tool and SecurityTool (Uninstall Guide)
How to remove Antivirus 2009 (Uninstall Instructions)
How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo
How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller
Locky Ransomware Information, Help Guide, and FAQ
CryptoLocker Ransomware Information Guide and FAQ
CryptorBit and HowDecrypt Information Guide and FAQ
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ
How to Enable the Dark Mode Theme in Windows 10
How to Change Your Twitter Password
How to Setup Login Verification in Twitter
How to Use Cortana As Your Virtual Assistant in Windows
How to start Windows in Safe Mode
How to remove a Trojan, Virus, Worm, or other Malware
How to show hidden files in Windows 7
How to see hidden files in Windows
IT Certification Courses
Gear + Gadgets
I'm a journalist based in Bucharest, Romania, trying to find stories nobody else is writing.
My features and analyses have appeared in Vice Motherboard, ZDNet, WIRED, The Outline, Computer Weekly, and tech.eu.
So far I've written stories on Romania, Bulgaria, Hungary, Greece, Moldova, Ukraine, and Lithuania.
I have 18 years of experience working as a radio journalist, 8 as a technology reporter, and 4 as a TV news voice-over.
During their investigation of NetTravler, Kaspersky Lab researchers discovered an unusual backdoor that could have helped another attacker access one of their main servers, and then use the group's infrastructure or steal data.
Not a member yet? Register Now