
How smartphones build a dossier on you
We break down the most covert mechanism of smartphone surveillance using real-life examples.
623 articles
We break down the most covert mechanism of smartphone surveillance using real-life examples.
Dangerous features are creeping into legitimate Chrome extensions. How to keep your organization safe?
How to avoid giving away your password to scammers when logging in to third-party sites or viewing “encrypted” or “confidential” documents.
A breakdown of the most high-profile data leaks ever: from Yahoo to RockYou2024.
In the wake of Google and Facebook, Mozilla has introduced its own technology for replacing third-party cookies: let’s take a look at how privacy-preserving attribution works.
Episode 354 has more DMA news, Microsoft in the docks, Google thwart influencer op & more!
Developers’ accounts are being hijacked using fake job offers sent from a legitimate GitHub address.
Training AI requires a colossal amount of data. Meta seems to have found a “brilliant” solution — using the personal data of its own users.
Cybercriminals are using genuine Facebook infrastructure to send phishing emails threatening to block accounts.
What websites do kids visit the most, which apps do they spend the most time on, аnd what aroused their greatest interest over the past year?
Every time a browser interacts with an advertising tracker, a program called Googerteller emits a short sound.
Episode 344 of the Kaspersky podcast looks at Meta AI blunders, Grindr in the docks & do 5-year olds’ need mobile phones?
In response to EU regulations, WhatsApp will soon offer interoperability with other messengers. Do we need it? And is it secure?
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities
Advertising firms boast that they can listen in on conversations through smart TVs and smartphones. Is this true, and, if so — how can you avoid being snooped on?
How malicious extensions steal cryptocurrency, hijack accounts in games and social networks, manipulate search results, and display intrusive ads.
Unused apps not only clutter your phone but also create a risk of personal data leakage, so it’s better to remove them. But what if an app can’t be uninstalled? There’s a workaround.
Exploring SBS ad opt-outs, emoji passwords, Meta’s ad-free subscription, and AI conversations on the latest in tech – Episode 322 of the Transatlantic Cable Podcast.
This report examines which apps kids spend most time on, and what specifically caught their interest this summer (June through August 2023).
The decentralized Mastodon social network claims to be a different breed of social network. Here’s how it works and how to use it without compromising privacy and security.