Knock-knock, let’s hack TikTok
A recent zero-click vulnerability in TikTok has led to high-profile accounts being taken over.
725 articles
A recent zero-click vulnerability in TikTok has led to high-profile accounts being taken over.
How to use private browsing mode, what it doesn’t protect against, and why Google is deleting five billion dollars’ worth of user data.
What websites do kids visit the most, which apps do they spend the most time on, аnd what aroused their greatest interest over the past year?
Google has unveiled new privacy and security features coming to Android 15. We take a look at the innovations in the upcoming operating system update.
We explore whether it’s possible to reveal all your secrets via your smartphone’s on-screen keyboard.
Vehicle makers sell the data collected by connected cars about their users’ driving habits to data brokers – who resell it to insurance companies.
Researchers have learned to recognize the positions and poses of people indoors using Wi-Fi signals. To do this, they used ordinary home routers and machine learning.
Expanding Global Transparency Initiative by opening Istanbul Transparency Center and launching a Transparency Lab together with Boğaziçi University
In response to EU regulations, WhatsApp will soon offer interoperability with other messengers. Do we need it? And is it secure?
Advertising firms’ extensive collection of personal data is becoming of great use to intelligence agencies. So how to guard against mass surveillance?
How to tell a real photo or video from a fake, and trace its provenance.
Today we dive into note-taking apps, to-do lists, and diaries that use end-to-end encryption: privacy-focused cousins of popular apps like OneNote, Evernote, Apple’s Notes, and Google Keep.
Hackers have long been engaging with the gaming world: from cracking games and creating cheats, to, more recently, attacking esports players live during an Apex Legends tournament. Regarding the latter, we break down what happened and how it could have been avoided.
A recent study shows how it’s possible to identify typed text from the sound of keystrokes — even in far-from-ideal environments.
With the EU’s Digital Markets Act having come into effect just days ago, both alternative app stores and true third-party browsers are set to appear on iPhones. How will this affect security, and what are iOS users losing?
Google updates the Android Location History feature. Why the change, and how will this work in the future?
AI tools can be seen everywhere — from operating systems and office suites to image editors and chats. How do you use ChatGPT, Gemini, DeepSeek and the many add-ons to these without jeopardizing your digital security?
Online dating is great for those looking for love – but beware the risks!
A fresh study of some unexpected properties of a standard feature of all modern smartphones and tablets.
Facebook now collects your link history and uses it to show targeted ads. Here’s how to disable this “handy” feature.
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities