
Why you should try listening to your cookies
Listen to your cookies with the Listening Back browser extension to understand the real scale of Web tracking.
3332 articles
Listen to your cookies with the Listening Back browser extension to understand the real scale of Web tracking.
Researcher Fabian Ising, speaking at the Chaos Communication Congress, showed the limits of PDF encryption’s strength.
If you don’t want to pay for extra gigabytes in iCloud, try these other ways to backup your photos and other iPhone files.
Dave and Jeff discuss the EU’s response to Facebook’s pleas for regulation, ransomware shutting down a US energy company, Ring requiring 2FA, and more.
Victor Chebyshev talks about the most common mobile threats and attack vectors of 2019.
Inexpensive, no-fuss Burning Man tickets for sale online. Just one problem: They’re fake.
What exactly do those age restrictions mean? Can a 10-year-old play a 12+ rated title?
Dave and Jeff discuss Facebook’s European plea for regulation, Black Energy spreading on the dark web, Boston Children’s Hospital faces a cyberattack, and more.
What exactly was certified and how the certification was performed
What is the story with Microsoft, Kaspersky and KB 4524244 security update all about?
In the hunt for your bank card info, the malware overlays apps with phishing pages and uses fake notifications to get you to open the apps.
Cybercriminals employing office cleaners to gain access into companies, the city of Racine hit with ransomware, Kaspersky SAS, the latest headaches for Twitter, and more.
We tell you which security and privacy settings will hold Twitter hackers and spammers at bay.
Considering buying a smartphone for your kid? Here are the pros and cons, and how to choose a device.
Researchers presented a study on the reliability of modern vehicle immobilization systems at the Chaos Communication Congress.
On this podcast, Dave and Jeff talk shop on the latest security issues exposed in Ring, GDPR’s impact, corporate espionage, a surprise Microsoft update, and more.
Ransomware makers seem to be following a new trend, publishing data from companies that refuse to pay them.
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
We reveal the best settings for protecting your profile from hackers, haters, and spammers.
Fear of the coronavirus is being leveraged by cybercriminals online to spread trojans and malware.