16 billion passwords leaked: what should I do?
First, don’t panic. Second, change your passwords. What else? Read this blogpost to protect your accounts.
596 articles
First, don’t panic. Second, change your passwords. What else? Read this blogpost to protect your accounts.
Planning a safe digital detox: a checklist to help prepare for a vacation and unwind in peace.
A look at how Apple’s new child protection features work, what their limitations are, and why you still can’t do without third-party solutions.
This is your World Password Day reminder about how to create strong passwords and remember them.
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.
How to counter new privacy invasions by browser developers
We break down the most covert mechanism of smartphone surveillance using real-life examples.
How to avoid giving away your password to scammers when logging in to third-party sites or viewing “encrypted” or “confidential” documents.
A breakdown of the most high-profile data leaks ever: from Yahoo to RockYou2024.
In the wake of Google and Facebook, Mozilla has introduced its own technology for replacing third-party cookies: let’s take a look at how privacy-preserving attribution works.
Episode 354 has more DMA news, Microsoft in the docks, Google thwart influencer op & more!
Developers’ accounts are being hijacked using fake job offers sent from a legitimate GitHub address.
Training AI requires a colossal amount of data. Meta seems to have found a “brilliant” solution — using the personal data of its own users.
Cybercriminals are using genuine Facebook infrastructure to send phishing emails threatening to block accounts.
Every time a browser interacts with an advertising tracker, a program called Googerteller emits a short sound.
Episode 344 of the Kaspersky podcast looks at Meta AI blunders, Grindr in the docks & do 5-year olds’ need mobile phones?
In response to EU regulations, WhatsApp will soon offer interoperability with other messengers. Do we need it? And is it secure?
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities
Advertising firms boast that they can listen in on conversations through smart TVs and smartphones. Is this true, and, if so — how can you avoid being snooped on?
How malicious extensions steal cryptocurrency, hijack accounts in games and social networks, manipulate search results, and display intrusive ads.