Brain drain: vulnerabilities in mental health apps
We’re diving into why mental health apps have become a headache for their users, and how to minimize the risks of medical data leaks.
481 articles
We’re diving into why mental health apps have become a headache for their users, and how to minimize the risks of medical data leaks.
Why do we have a love-hate relationship with dating apps, and what are they doing to our brains? Can an emoji start a war? Is marrying an AI actually a thing? We’re exploring how modern tech is redefining love and our very ideas of it.
Today we’re diving into the OpenClaw AI agent — formerly known as “Clawdbot” and then “Moltbot” — to prove once again that secure AI is still a long way off.
Children’s AI toys have been caught discussing drugs and sex with kids. We break down the results of a study that reveals exactly how these smart (too smart!) toys are blowing up past boundaries.
From karaoke rooms to gynecology clinics — these are just some of the tens of thousands of locations where compromised IP cameras were discovered in South Korea. Here’s how to avoid unwittingly starring in steamy videos you didn’t authorize.
A new wave of ClickFix attacks spreading a macOS infostealer are posting malicious user guides on the official ChatGPT website by piggybacking the chatbot’s chat-sharing feature.
Researchers have discovered how to connect to someone else’s dashcam in a matter of seconds, and weaponize it for future attacks.
How attackers use AI-generated fake websites to distribute trojanized builds of the legitimate Syncro remote access tool (RAT).
We’re going bargain hunting in a new way: armed with AI. In this post: examples of effective prompts.
Kaspersky for Linux is now available to home users.
We explain what data DeepSeek collects, who it shares it with, how to configure the chatbot for maximum privacy, and how to install a local version.
Artificial intelligence has given scammers a new set of tools for deception — from generating deepfakes, to instantly setting up phishing websites or fraudulent email campaigns. Let’s discuss the latest AI trends in phishing and scams — and how to stay safe.
A close look at attacks on LLMs: from ChatGPT and Claude to Copilot and other AI-assistants that power popular apps.
The internet never forgets — and what kids post or share today can come back to hurt them, either right away or years down the line. Here’s how to shrink your child’s digital footprint without resorting to battles or bans.
How 5G smartphone connectivity can be compromised, and what it means for subscribers.
This article explains what might happen if someone transfers you funds and then you withdraw the equivalent in cash from your account to give to them, or if you use your own card to pay for a purchase they make.
We explore which messaging apps let you chat without an internet connection or cell service, and why you might need this.
Brushing, quishing, and other fraud schemes that begin with the delivery by courier of a product you never ordered.
Everything you need to know about the latest Telegram scams and phishing, and how to stay safe.
Regulation and the evolving threat landscape are driving companies to adopt more resilient forms of employee authentication. Are passkeys a cost-effective and straightforward replacement for traditional passwords?
A detailed guide to configuring security and privacy in Garmin Connect and the Connect IQ Store.