Your personal cybersecurity checklist for 2026
Eight digital New Year’s resolutions you absolutely need to keep.
672 articles
Eight digital New Year’s resolutions you absolutely need to keep.
We’ve identified a new infostealer named Stealka, which masquerades as pirated software and game mods. It targets data stored inside browsers, locally installed applications, and crypto wallets.
We’re going bargain hunting in a new way: armed with AI. In this post: examples of effective prompts.
Systematic measures and tools that organizations can use to defend against malicious browser extensions.
How malicious extensions can spoof AI sidebars in the Comet and Atlas browsers, intercept user queries, and manipulate model responses.
You’ve received a threatening email. What’s your next move?
Which social networks mostly just display your posts to your friends, and which ones use them for AI training and ad targeting? We explore the 2025 privacy rankings for popular social media platforms.
The optical sensors in computer mice can be used for eavesdropping. We break down why this is fascinating — but still a long way from real-world practicality.
We explain what data DeepSeek collects, who it shares it with, how to configure the chatbot for maximum privacy, and how to install a local version.
A comprehensive guide to configuring privacy and security in ChatGPT: data collection and usage, memory, Temporary Chats, connectors, and account security.
How AI-generated code is changing cybersecurity — and what developers and “vibe coders” should expect.
A close look at attacks on LLMs: from ChatGPT and Claude to Copilot and other AI-assistants that power popular apps.
A race between tech giants is unfolding before our very eyes. Who’ll be the first to transform the browser into an AI assistant app? As you test these new products, be sure to consider their enormous impact on security and privacy.
The internet never forgets — and what kids post or share today can come back to hurt them, either right away or years down the line. Here’s how to shrink your child’s digital footprint without resorting to battles or bans.
How 5G smartphone connectivity can be compromised, and what it means for subscribers.
We explain how cyberattackers intercept cookies, the role of the session ID, and how to keep your cookies from going over to the dark side.
Thousands of companies exist for one purpose only: to collect and resell information about each of us. How do they do it, how can you limit data collection, and how do you delete what’s already been collected?
Everything you need to know about the latest Telegram scams and phishing, and how to stay safe.
We’ve uncovered a new Trojan — Efimer — which steals cryptocurrency via the clipboard. Here’s how it functions, and how you can stay protected.
Deepfake videos, fraudulent Instagram and Facebook accounts, private WhatsApp chats: how Mark Zuckerberg’s social media platforms have become a primary tool for investment scammers.
Can you ditch passwords entirely for passkeys? We explore when it’s possible, and when it’s still a challenge.