AirTag stalking and how to protect yourself
In the past year, a slew of cases in which criminals used AirTags to stalk people have come to light. We explain how this works and how to protect yourself.
275 articles
In the past year, a slew of cases in which criminals used AirTags to stalk people have come to light. We explain how this works and how to protect yourself.
Here’s how to configure cookies in Chrome, Safari, Firefox and Edge.
How to set app permissions in iOS 15 for maximum privacy and security.
A recent study shows that even “clean” Android smartphones collect a lot of information about their owners.
Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices.
How Zoom security is evolving, what threats are still current, and how developers plan to eliminate them.
How to respond to tracking requests in iOS, iPadOS and tvOS 14.5 — or opt out of app tracking completely.
Nowadays, building a dossier on any Internet user is easier than you might think. Learn about doxers and their methods.
Stalkerware activity dropped off during the pandemic, but it’s picking up again. How to deal with the threat.
A server configuration oversight caused data from SuperVPN, GeckoVPN, and ChatVPN users to leak online. It’s now for sale on a hacker forum.
Facebook lets you manage the data it collects from third-party websites and apps. Here’s how.
The terms are sometimes confused; we help unravel the differences.
Evade spammers, take control of your notifications, and protect your Discord account from hijacking.
We explain why secret chats in Telegram are a must, and how to configure security and privacy.
Researchers have created an extension to learn about the information websites collect to “fingerprint” browsers.
Anyone can experience in-game bullying. What to do if aggressive gamers target you.