
How to defend against hijacking and trojanization of Chrome extensions
Dangerous features are creeping into legitimate Chrome extensions. How to keep your organization safe?
654 articles
Dangerous features are creeping into legitimate Chrome extensions. How to keep your organization safe?
Mistakes to learn from in 2024 – and resolutions for a safer 2025.
Black Friday is a great opportunity for scammers to line their pockets — but not with your money if you follow our advice.
Five dead simple tips to greatly improve your defenses against cybercriminals.
The Tor Browser is a bastion of online anonymity, yet even this tool can’t ensure complete privacy — and here’s why.
A detailed guide to configuring privacy settings in the ASICS Runkeeper running app.
A detailed guide on setting up privacy in the adidas Running app.
A detailed guide to configuring privacy settings in the MapMyRun fitness tracker.
This guide will walk you through the essential privacy settings in the Nike Run Club training app.
Want to keep your runs, rides, and hikes private on Strava? This guide will walk you through the essential privacy settings in this popular fitness app.
Episode 360 looks at fake Taylor Swift, Nvidia woes, TV ads and much more!
In the wake of Google and Facebook, Mozilla has introduced its own technology for replacing third-party cookies: let’s take a look at how privacy-preserving attribution works.
Cybercriminals are using AitM techniques to compromise accounts of company executives. How do they do this, and how to protect against it?
Although Microsoft has radically revised the rollout plan for its controversial Recall feature, cybersecurity teams can’t afford to ignore the issue of “AI onlookers.
The JavaScript CDN service Polyfill.io has started spreading malicious code. Remove the service’s script from your website.
Episode 354 has more DMA news, Microsoft in the docks, Google thwart influencer op & more!
A new phishing technique uses progressive web apps (PWAs) to mimic browser windows with convincing web addresses to steal passwords.