Messaging app privacy: 2025 rankings
Which messaging apps leak the least amount of your data, and provide the most control over your privacy? Today we discuss the latest rankings of popular communication platforms.
685 articles
Which messaging apps leak the least amount of your data, and provide the most control over your privacy? Today we discuss the latest rankings of popular communication platforms.
A comprehensive guide to configuring privacy and security in ChatGPT: data collection and usage, memory, Temporary Chats, connectors, and account security.
A step-by-step guide to deleting as much of your digital footprint as possible.
How AI-generated code is changing cybersecurity — and what developers and “vibe coders” should expect.
We discovered a new wave of attacks on WhatsApp users in which attackers steal victims’ accounts using fake voting pages and social engineering on social networks.
Artificial intelligence has given scammers a new set of tools for deception — from generating deepfakes, to instantly setting up phishing websites or fraudulent email campaigns. Let’s discuss the latest AI trends in phishing and scams — and how to stay safe.
We explain how cyberattackers intercept cookies, the role of the session ID, and how to keep your cookies from going over to the dark side.
Thousands of companies exist for one purpose only: to collect and resell information about each of us. How do they do it, how can you limit data collection, and how do you delete what’s already been collected?
Here’s what any responsible parent should do if their kid wants to be a blogger.
Adjust your daily routines to leave as little data about yourself online as possible.
Drawing from INTERPOL’s just-released Africa Cyberthreat Assessment Report, we identify which threats most often target developing businesses – and how to stop them.
We’ve launched the Kaspersky eSIM Store — an easy way to buy and activate eSIM cards, giving you instant cellular internet access in over 150 countries and regions worldwide.
Malicious actors are busy setting up fake Netflix websites, trying to trick visitors into paying for supposedly legitimate subscriptions, and promising in-game currency and skins for popular games. How else are they scamming Gen Zers, and what can we do to fight back?
This report delves into the cyberthreat landscape that has exploited Gen Z’s favorite games from Q2 2024 to Q1 2025, highlighting the related dangers and providing insights on how to protect yourself from these threats.
Scammers are promising compensation from a bank to all comers — with no exceptions — and to boost their credibility they’ve even rolled out a deepfake newscast generated by AI.
Kaspersky analyzed what modern children are interested in on the Internet.
A popular password manager was modified to allow attackers to steal passwords and encrypt users’ data. How to protect home computers and corporate systems from this threat?
Planning a safe digital detox: a checklist to help prepare for a vacation and unwind in peace.
This report delves into the cyberthreat landscape that has exploited Gen Z’s favorite streaming services, films, series and anime from Q2 2024 to Q1 2025, highlighting the related dangers and providing insights on how to protect yourself from these threats.
A look at how Apple’s new child protection features work, what their limitations are, and why you still can’t do without third-party solutions.
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.