Tor Browser and anonymity: what you need to know
The Tor Browser is a bastion of online anonymity, yet even this tool can’t ensure complete privacy — and here’s why.
45 articles
The Tor Browser is a bastion of online anonymity, yet even this tool can’t ensure complete privacy — and here’s why.
In the wake of Google and Facebook, Mozilla has introduced its own technology for replacing third-party cookies: let’s take a look at how privacy-preserving attribution works.
A zero-day vulnerability actively exploited by attackers has been discovered in Internet Explorer — the browser that Microsoft supposedly laid to rest over a year ago.
A new phishing technique uses progressive web apps (PWAs) to mimic browser windows with convincing web addresses to steal passwords.
Every time a browser interacts with an advertising tracker, a program called Googerteller emits a short sound.
How malicious extensions steal cryptocurrency, hijack accounts in games and social networks, manipulate search results, and display intrusive ads.
Methods used by attackers to redirect victims to malicious and phishing sites from seemingly safe URLs.
How attackers use infected archives and malicious browser extensions to steal Facebook Business accounts.
We explore what Google Ad Topics is, how it functions, and how to disable it. Along the way, we discuss the related topics of Google FLoC, Privacy Sandbox, and the demise of third-party cookies.
A few words on why desktop applications based on the Electron framework should be approached with caution.
Some thoughts on what PC software patches should be prioritized and why.
Where to store credentials: browser or password manager? The latter, of course. Here’s why.
A few dozen malicious extensions — with a combined 87 million downloads — discovered in Google’s Chrome Web Store.
In its February update, Microsoft buried Internet Explorer once and for all. Or did it? We investigate what really happened.
Alternatives to Google Chrome that take data privacy more seriously.
It’s common practice in many companies to keep work and personal information separate. But browser synchronization often remains unnoticed — and attackers are already exploiting it.
How a vector graphics editor helped create one of the internet’s most important technologies, and why it led to huge security risks.
Using the most common families of malicious extensions as an example, we explain what can go wrong after installing a browser plug-in.
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.
If you use an iPhone, it’s crucial to always install the Safari and WebKit updates, even if your browser of choice is Chrome, Firefox or something else. Here’s why.
The recent Google Chrome update patches 10 high severity vulnerabilities and a dozen of less critical bugs. Time to update your browser!