Ecovacs robot vacuums get hacked
Unknown hackers are exploiting newly discovered vulnerabilities in Ecovacs robot vacuums to spy on their owners and rain misery upon them.
482 articles
Unknown hackers are exploiting newly discovered vulnerabilities in Ecovacs robot vacuums to spy on their owners and rain misery upon them.
Mistakes to learn from in 2024 – and resolutions for a safer 2025.
The best privacy-focused services that make practical gifts for friends and family.
How a simple, well-known general threat became a key targeted-attack vector on companies.
Is a taped-over webcam or phonecam a sign of paranoia – or smart thinking?
Scammers posing as buyers snatch one-time codes during online product demos.
Cybercriminals are enticing Telegram users with free subscriptions. Is this an unexpected act of generosity or just another scam?
Black Friday is a great opportunity for scammers to line their pockets — but not with your money if you follow our advice.
A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.
We’ve updated the design of our password manager’s mobile version. Storing and managing passwords is now even more convenient.
Five dead simple tips to greatly improve your defenses against cybercriminals.
Many popular online services these days require a selfie with your ID card or passport to register. We explore whether taking such photos is safe (spoiler: it’s not) and how to minimize the risks.
Want to keep your runs, rides, and hikes private on Strava? This guide will walk you through the essential privacy settings in this popular fitness app.
Running apps know a lot about their users, so it’s worth setting them up to ensure your data doesn’t fall into the wrong hands. Here’s how.
A breakdown of the most high-profile data leaks ever: from Yahoo to RockYou2024.
Going on vacation? We’ve compiled a traveler’s guide to help you have an enjoyable safe time and completely get away from the routine.
Small beacons like AirTag make it easy to find a lost wallet or keys — but are also often used for covert tracking. Now you can detect stalkers and protect yourself — regardless of what kind of smartphone you have.
“Gentle grafters” are attacking dishonest crypto users by imitating wallet leaks and manipulating their victims for months.
The new AI function in Microsoft Windows has already been dubbed a “security nightmare” on the internet. What risks does it carry, and how to stay safe?