
Geolocation data brokers: What they do and what happens when they leak
The recent leak at major location-data broker, Gravy Analytics, shines a light on the implications of mass location-data collection.
114 articles
The recent leak at major location-data broker, Gravy Analytics, shines a light on the implications of mass location-data collection.
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
We’ve discovered apps in the official Apple and Google stores that steal cryptocurrency wallet data by analyzing photos.
Banshee stealer, a macOS stealer that emerged last year, is now roaming free on the Web, infecting Mac users and gaining new capabilities. How to protect yourself?
We explain how to detect if scammers have gained access to your Telegram account, and what to do about it.
A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.
Recent research describes a method for snooping on what Apple Vision Pro users enter on the virtual keyboard.
Worried about your access to Telegram and its privacy after Pavel Durov’s arrest? Here’s what you should (and shouldn’t!) do right now.
Small beacons like AirTag make it easy to find a lost wallet or keys — but are also often used for covert tracking. Now you can detect stalkers and protect yourself — regardless of what kind of smartphone you have.
Although Microsoft has radically revised the rollout plan for its controversial Recall feature, cybersecurity teams can’t afford to ignore the issue of “AI onlookers.
The exact location of your router is publicly available through global Wi-Fi geolocation databases. Let’s explore why this is necessary, and the risks it entails and how to mitigate them.
How to use private browsing mode, what it doesn’t protect against, and why Google is deleting five billion dollars’ worth of user data.
Advertising firms’ extensive collection of personal data is becoming of great use to intelligence agencies. So how to guard against mass surveillance?
We review a recent research paper highlighting a major hardware vulnerability in Apple M1, M2, and M3 CPUs.
Apple has released a new encryption protocol – PQ3 – for iMessage, which provides post-quantum security for instant messaging.
Advertising firms boast that they can listen in on conversations through smart TVs and smartphones. Is this true, and, if so — how can you avoid being snooped on?
How unfortunate investors in commodities, cryptocurrency, and other assets get scammed in apps found in official stores.
A researcher has discovered a vulnerability in the Bluetooth protocol implementations for Android, macOS, iOS, and Linux, allowing devices to be hacked remotely.
Are Macs as safe as their owners think they are? A few recent stories about malware targeting macOS users.
The Nothing Chats app from Nothing Phone promised to be the iMessage for Android, but in less than 24 hours it was removed from Google Play due to a shocking lack of security.
Everything you wanted to know about Google account passkeys: how they work, why they’re needed, where to enable them, how to configure them, and what storage options are available.