
Geolocation data brokers: What they do and what happens when they leak
The recent leak at major location-data broker, Gravy Analytics, shines a light on the implications of mass location-data collection.
226 articles
The recent leak at major location-data broker, Gravy Analytics, shines a light on the implications of mass location-data collection.
We look into every method of hijacking WhatsApp, Telegram, and other messaging accounts – from quishing to fake gifts and viruses, and ways to protect yourself against them.
We’ve discovered apps in the official Apple and Google stores that steal cryptocurrency wallet data by analyzing photos.
Attackers are pumping out fake wedding invitations containing malicious APKs to Android users. To find out how to guard against this new threat, read on.
Our Android apps are no longer available on Google Play. We explain how to download, install, and update them by alternative means.
We explain how to detect if scammers have gained access to your Telegram account, and what to do about it.
A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.
We’ve updated the design of our password manager’s mobile version. Storing and managing passwords is now even more convenient.
Our products are no longer available on Google Play. We explain why this happened, and how to install or update our apps for Android.
At risk are users of modified versions of Spotify, WhatsApp, Minecraft, and other apps from Google Play.
Worried about your access to Telegram and its privacy after Pavel Durov’s arrest? Here’s what you should (and shouldn’t!) do right now.
Small beacons like AirTag make it easy to find a lost wallet or keys — but are also often used for covert tracking. Now you can detect stalkers and protect yourself — regardless of what kind of smartphone you have.
The masterminds behind the colossal botnet encompassing 19 million IP addresses used free VPN services as bait to lure unsuspecting users.
Google has unveiled new privacy and security features coming to Android 15. We take a look at the innovations in the upcoming operating system update.
We explore whether it’s possible to reveal all your secrets via your smartphone’s on-screen keyboard.
Advertising firms’ extensive collection of personal data is becoming of great use to intelligence agencies. So how to guard against mass surveillance?
Today we dive into note-taking apps, to-do lists, and diaries that use end-to-end encryption: privacy-focused cousins of popular apps like OneNote, Evernote, Apple’s Notes, and Google Keep.
Google updates the Android Location History feature. Why the change, and how will this work in the future?
How unfortunate investors in commodities, cryptocurrency, and other assets get scammed in apps found in official stores.
A researcher has discovered a vulnerability in the Bluetooth protocol implementations for Android, macOS, iOS, and Linux, allowing devices to be hacked remotely.