• Take the perfect Eid selfies

    Selfies are a love-hate relationship. You love to take them but hate how it makes you look not-quite-right all the time. With Eid coming around the corner, you will take lot of photos to cherish the fun times with friends, family and the occasional runaway cow you may or may not have helped capture. Here's how you can take the best selfies.

  • Digital Fraud: Tips to tackle

    EID is right around the corner and everyone has their shopping gears on. To make your EID shopping experience

  • How to install Android 6.0 Marshmallow on your Windows PC

    Here is a guide on how you install Android 6.0 Marshmallow onto your Windows PC and run it just like you’d run it on a phone or tablet,

  • 20 Google search tricks you should know

    Google search became as popular as it is now due in large part to its simplicity, and the service remains wonderfully simple to this day.

  • How to hide unwanted Apple apps on iPhone

    Apps like Compass, Tips, and the Watch app all come pre-installed on your iPhone with no way to delete them, but now here there is a clever way to hide them.

  • 14 things you didn't know about your iPhone headphones

    iPhone headphones surpass their initial purpose and can do much more than you can imagine

  • How smartphone light affects your health

    Checking your phone at night and before going to sleep seems like a normal habitual act, but it is some harmful than you think.

  • Web Review: Facebook to solve your desperate needs

    The Facebook group, Desperately Seeking- Dhaka, is an interesting initiative by social media activists to engage a vast number of Facebook users under one banner to share their problems, queries and needs, and there is always someone with an answer to them, no matter how queer your needs are and how difficult the solution is!

  • How easy is it for hackers to steal your face?

    Cybercriminals hunt for data of all kinds: personal details, photos, videos and even ways that users interact with others; this data is often stolen from social networks. Stolen data is often posted elsewhere online to be sold to other criminals looking to make a profit.

  • Five must-try cooking channels

    Whether you're a sous chef extraordinaire in the making or a klutz in the kitchen with two left hands, if you're looking for ideas for your next big fancy dress dinner party or just want to impress your loved ones, check out these five exciting cooking channels.

  • Five ways to protect your private photos: Part 2

    Remember last year's well-publicized leak, which exposed some celebrities' nude photos? The story not only made some individuals' day

  • Lose your phone, not your data

    If you are one of those unfortunate who has gotten mugged, I sympathise. Losing your phone, especially today when we practically live on it, can be difficult. But more important and valuable than your phone is the massive amount of personal data, pictures and files that is not at the hands of someone else. While there are steps you should take the soonest your phone has been lost to you, there are a few steps before hand that gives an extra layer of security which could make all the difference.

  • Stay safe online

    Here are a few internet security and privacy basics to save you from the hassle of having your information or account stolen.

  • Five ways to protect your private photos: Part 1

    Remember last year's well-publicized leak, which exposed some celebrities' nude photos? The story not only made some individuals' day (and probably night), it turned to be a very educating precedent. For instance, it made many people realize that their pet's name is not the safest password, and two-factor authentication is not meant exclusively for IT geeks, but for any Swarovski-adorned iPhone owner as well. However, 2FA in iCloud, as well as in Gmail, Facebook and many other web services, is optional. Thus the consequences can be devastating, especially if your work at an Internet company. Here's part 1:

  • How to pick the perfect password

    Hackers manages to decode more than 11 million encrypted passwords stolen from the Ashley Madison website, shining fresh light on the importance of password security.

  • Tips on confronting a cyberbully

    The Internet can be used as a terrifyingly efficient medium for cyberbullying. It is also very easy to get stuck in an endless circle of hurt from these kinds of attacks.

  • How to keep your iPhone memory uncluttered

    Decreasing memory is a major problem for most iPhone users. Generally they are stuck with whatever internal storage their device

  • Are we addicted to technology?

    Tech-related burnout is common in people with certain personality traits.

  • Not everything on the Internet is what it seems

    When you hear adults saying, “kids are helpless,” it makes you angry, right? You bet it does even if you are the most self-sustained

  • 95% of Android phones can be hacked with just one MMS, millions at risk

    The most scandalous threat is tickling the nerves of Android phones owners: Zimperium zLabs reported six gaping holes in Google OS

  • Creating a 3D hologram with your smartphone (video)

    YouTube user Mrwhosetheboss in fact has created this devilishly simple video which shows how using just a few everyday items you can turn your smartphone into your very own holographic projector.

  • Top 5 YouTube Channels To Get Smart

    Today we bring you a list of top 5 YouTube channels to get smart. These channels will enlighten you on various topics; ranging from human evolution to communism to how to spot a lie!

  • Security do's and don'ts: Keeping weirdos aside

    How much time do you spend scrolling through your friends pages on Facebook? You can obviously tell a lot about their lifestyle and

  • Don't get caught on the Internet: Beware of viruses

    So you think hackers and cyberspies are something you only see at the cinema? Think again! The Internet is crawling with weirdos and

  • How Kaspersky Internet Security protects from ransomware

    Ransomware is a kind of malware that steals users' files and exacts a ransom from its victims. The most effective approach is to

  • Facebook to share advertising revenue with video creators

    The company launches a suggested videos feed that curates a sequence of clips, interspersed with adverts.

  • Facebook to share advertising revenue with video creators

    The company launches a suggested videos feed that curates a sequence of clips, interspersed with adverts.

  • Kaspersky Lab is ready to protect your Facebook account!

    Why would cyber-criminals want to control your Facebook account? At the very least, they could “like” weird things and promote questionable goods and services on your