Restricted Settings in Android 13 and 14
Android 13 and 14 have a feature called Restricted Settings. We explain its purpose, and how malicious applications bypass it.
91 articles
Android 13 and 14 have a feature called Restricted Settings. We explain its purpose, and how malicious applications bypass it.
Typical security issues of WordPress, and how they can be addressed to protect your website or online store from cybercriminals.
The Nothing Chats app from Nothing Phone promised to be the iMessage for Android, but in less than 24 hours it was removed from Google Play due to a shocking lack of security.
How attackers use infected archives and malicious browser extensions to steal Facebook Business accounts.
We discuss what zero-click attacks are, why they’re dangerous, and how to protect your company from them.
Four handy ways to lock your screen on Windows and macOS.
A look at some recent cases of Android malware infiltrating the most official of official app stores — Google Play.
Everything you wanted to know about Google account passkeys: how they work, why they’re needed, where to enable them, how to configure them, and what storage options are available.
The three most dangerous Android features that make your smartphone much more vulnerable to malware.
It’s time to update Confluence Data Center and Confluence Server: they contain a serious vulnerability that allows unauthorized creation of administrator accounts.
Examples of password policies that will have users tearing their hair out — and why you shouldn’t employ them.
Fraudsters are buying blue checkmarks to impersonate well-known brands on X (ex-Twitter) and scam users.
We explore what Google Ad Topics is, how it functions, and how to disable it. Along the way, we discuss the related topics of Google FLoC, Privacy Sandbox, and the demise of third-party cookies.
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
A few words on why desktop applications based on the Electron framework should be approached with caution.
We explain what the Fediverse is, how it works, where you can experience it today, and what to expect in the future.
Why the Windows system time can suddenly change, and how to stop it from happening.
We explain what OSINT is, why it has to be front-of-mind at all times, and how to guard against hackers using it.
Some thoughts on what PC software patches should be prioritized and why.
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
Gadgets to help protect employees’ devices against hackers and other threats.