
How to Protect Your Privacy on Pinterest
Every couple of months, seemingly, the world gets up in arms about the latest changes to Facebook’s privacy policy. But Facebook isn’t the only social media site that collects and
800 articles
Every couple of months, seemingly, the world gets up in arms about the latest changes to Facebook’s privacy policy. But Facebook isn’t the only social media site that collects and
Google’s social networking site, Google+, continues to grow in popularity. But as with all social media sites, over-sharing your personal information is easy to do on Google+. Use these 10
Heads up, you secretive Facebook users who have made yourself unsearchable on the world’s most popular social networking platform: You can hide no more. Facebook announced updated privacy features —
The latest in Threatpost‘s ongoing How-To video series, we give tips and tricks on better securing the privacy of your Facebook account.
In a study of just how much people value their privacy, Carnegie Mellon University professor Alessandro Acquisti and other researchers went to a mall outside of Pittsburgh, Pa. They had
As the use of Smartphones continues to grow in the U.S., the majority of users are very sensitive about how much personal information they have to share when downloading apps
A step-by-step guide to deleting as much of your digital footprint as possible.
We discovered a new wave of attacks on WhatsApp users in which attackers steal victims’ accounts using fake voting pages and social engineering on social networks.
The Kaspersky for Android app can now detect malicious links in notifications from any app.
Artificial intelligence has given scammers a new set of tools for deception — from generating deepfakes, to instantly setting up phishing websites or fraudulent email campaigns. Let’s discuss the latest AI trends in phishing and scams — and how to stay safe.
This is a tale about how vulnerabilities in apps by intimate-toy maker Lovense exposed users’ identities and allowed for account takeovers — a problem the company ignored for years.
A race between tech giants is unfolding before our very eyes. Who’ll be the first to transform the browser into an AI assistant app? As you test these new products, be sure to consider their enormous impact on security and privacy.
We explain how cyberattackers intercept cookies, the role of the session ID, and how to keep your cookies from going over to the dark side.
WordPress sites are increasingly becoming targets of attacks exploiting vulnerabilities in plugins and themes. In this post, we examine recent cases and share protection tips.
Thousands of companies exist for one purpose only: to collect and resell information about each of us. How do they do it, how can you limit data collection, and how do you delete what’s already been collected?
We explore which messaging apps let you chat without an internet connection or cell service, and why you might need this.
Here’s what any responsible parent should do if their kid wants to be a blogger.
Brushing, quishing, and other fraud schemes that begin with the delivery by courier of a product you never ordered.
Everything you need to know about the latest Telegram scams and phishing, and how to stay safe.
Attackers hijack Discord invite links and redirect victims to scam servers to install malware using the ClickFix technique.