How Apple plans to monitor users
Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices.
266 articles
Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices.
The pandemic changed many things, but an increase in doxing was one that many people didn’t expect.
How Zoom security is evolving, what threats are still current, and how developers plan to eliminate them.
New research shows that whilst European’s are keen to take control of their personal data, many of them feel lost in how to go about it.
How to respond to tracking requests in iOS, iPadOS and tvOS 14.5 — or opt out of app tracking completely.
Nowadays, building a dossier on any Internet user is easier than you might think. Learn about doxers and their methods.
Stalkerware activity dropped off during the pandemic, but it’s picking up again. How to deal with the threat.
A server configuration oversight caused data from SuperVPN, GeckoVPN, and ChatVPN users to leak online. It’s now for sale on a hacker forum.
Facebook lets you manage the data it collects from third-party websites and apps. Here’s how.
The terms are sometimes confused; we help unravel the differences.
We explain why secret chats in Telegram are a must, and how to configure security and privacy.
Researchers have created an extension to learn about the information websites collect to “fingerprint” browsers.
Anyone can experience in-game bullying. What to do if aggressive gamers target you.
Mobile apps can track your location and sell the data to third parties. What can you do about it?
The Kaspersky Next event looked at human augmentation, Cerberus and hospital hackers
We use raccoons to explain how identification, authorization, and authentication differ, and why 2FA is necessary.
Human augmentation, once the preserve of science fiction is quickly entering normal life – how will this change us?