
How smartphones build a dossier on you
We break down the most covert mechanism of smartphone surveillance using real-life examples.
589 articles
We break down the most covert mechanism of smartphone surveillance using real-life examples.
How to avoid giving away your password to scammers when logging in to third-party sites or viewing “encrypted” or “confidential” documents.
A breakdown of the most high-profile data leaks ever: from Yahoo to RockYou2024.
In the wake of Google and Facebook, Mozilla has introduced its own technology for replacing third-party cookies: let’s take a look at how privacy-preserving attribution works.
Episode 354 has more DMA news, Microsoft in the docks, Google thwart influencer op & more!
Developers’ accounts are being hijacked using fake job offers sent from a legitimate GitHub address.
Training AI requires a colossal amount of data. Meta seems to have found a “brilliant” solution — using the personal data of its own users.
Cybercriminals are using genuine Facebook infrastructure to send phishing emails threatening to block accounts.
Every time a browser interacts with an advertising tracker, a program called Googerteller emits a short sound.
Episode 344 of the Kaspersky podcast looks at Meta AI blunders, Grindr in the docks & do 5-year olds’ need mobile phones?
In response to EU regulations, WhatsApp will soon offer interoperability with other messengers. Do we need it? And is it secure?
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities
Advertising firms boast that they can listen in on conversations through smart TVs and smartphones. Is this true, and, if so — how can you avoid being snooped on?
How malicious extensions steal cryptocurrency, hijack accounts in games and social networks, manipulate search results, and display intrusive ads.
Unused apps not only clutter your phone but also create a risk of personal data leakage, so it’s better to remove them. But what if an app can’t be uninstalled? There’s a workaround.
Exploring SBS ad opt-outs, emoji passwords, Meta’s ad-free subscription, and AI conversations on the latest in tech – Episode 322 of the Transatlantic Cable Podcast.
The decentralized Mastodon social network claims to be a different breed of social network. Here’s how it works and how to use it without compromising privacy and security.
Gadgets to help protect employees’ devices against hackers and other threats.
Here’s how to set up Threads to make your profile both private and secure.
How to secure chats on your phone, and why encryption alone is not enough