Infostealer has entered the chat
A new wave of ClickFix attacks spreading a macOS infostealer are posting malicious user guides on the official ChatGPT website by piggybacking the chatbot’s chat-sharing feature.
149 articles
A new wave of ClickFix attacks spreading a macOS infostealer are posting malicious user guides on the official ChatGPT website by piggybacking the chatbot’s chat-sharing feature.
The Whisper Leak attack allows its perpetrator to guess the topic of your conversation with an AI assistant — without decrypting the traffic. We explore how this is possible, and what you can do to protect your AI chats.
A race between tech giants is unfolding before our very eyes. Who’ll be the first to transform the browser into an AI assistant app? As you test these new products, be sure to consider their enormous impact on security and privacy.
Thousands of companies exist for one purpose only: to collect and resell information about each of us. How do they do it, how can you limit data collection, and how do you delete what’s already been collected?
Google has rolled out an update for Android that gives Gemini access to your Phone, Messages, WhatsApp, and Utilities data without your explicit consent. Here’s a detailed guide on how to disable these permissions.
Adjust your daily routines to leave as little data about yourself online as possible.
This guide dives into using passkeys to sign in from someone else’s computer, storing them on a removable device, and transferring between devices.
Can you ditch passwords entirely for passkeys? We explore when it’s possible, and when it’s still a challenge.
Scammers are using Google ads to push fake versions of real websites – and they’re after business accounts and company data.
Scammers are exploiting Google services to send fake law enforcement inquiry notifications, making them look like they originate from accounts.google.com.
Cybercriminals are inventing new ways to swipe money from payment cards by using credentials phished online or over the phone. Sometimes, just holding your card to your phone is enough to leave you penniless.
Apple’s Find My network can be exploited to remotely track other vendors’ Android, Windows, and Linux devices.
How to counter new privacy invasions by browser developers
We dive into the mechanics of the controversial nude-scanning app that has mysteriously materialized on a billion phones.
A vulnerability in Google OAuth allows attackers to access accounts of defunct organizations through abandoned domains.
We break down the most covert mechanism of smartphone surveillance using real-life examples.
The recent leak at major location-data broker, Gravy Analytics, shines a light on the implications of mass location-data collection.
We’ve discovered apps in the official Apple and Google stores that steal cryptocurrency wallet data by analyzing photos.
Hundreds of new gadgets and smart appliances are traditionally unveiled every January at the Consumer Electronics Show in Vegas. How will they affect our cybersecurity?
A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.
Worried about your access to Telegram and its privacy after Pavel Durov’s arrest? Here’s what you should (and shouldn’t!) do right now.