How to protect yourself from Bluetooth stalking and more
A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.
119 articles
A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.
Worried about your access to Telegram and its privacy after Pavel Durov’s arrest? Here’s what you should (and shouldn’t!) do right now.
In the wake of Google and Facebook, Mozilla has introduced its own technology for replacing third-party cookies: let’s take a look at how privacy-preserving attribution works.
Small beacons like AirTag make it easy to find a lost wallet or keys — but are also often used for covert tracking. Now you can detect stalkers and protect yourself — regardless of what kind of smartphone you have.
Although Microsoft has radically revised the rollout plan for its controversial Recall feature, cybersecurity teams can’t afford to ignore the issue of “AI onlookers.
The exact location of your router is publicly available through global Wi-Fi geolocation databases. Let’s explore why this is necessary, and the risks it entails and how to mitigate them.
A new phishing technique uses progressive web apps (PWAs) to mimic browser windows with convincing web addresses to steal passwords.
How to use private browsing mode, what it doesn’t protect against, and why Google is deleting five billion dollars’ worth of user data.
Google has unveiled new privacy and security features coming to Android 15. We take a look at the innovations in the upcoming operating system update.
Every time a browser interacts with an advertising tracker, a program called Googerteller emits a short sound.
Advertising firms’ extensive collection of personal data is becoming of great use to intelligence agencies. So how to guard against mass surveillance?
Google OAuth allows to create phantom Google accounts — uncontrollable by corporate Google Workspace administrators.
Advertising firms boast that they can listen in on conversations through smart TVs and smartphones. Is this true, and, if so — how can you avoid being snooped on?
How malicious extensions steal cryptocurrency, hijack accounts in games and social networks, manipulate search results, and display intrusive ads.
A researcher has discovered a vulnerability in the Bluetooth protocol implementations for Android, macOS, iOS, and Linux, allowing devices to be hacked remotely.
Everything you wanted to know about Google account passkeys: how they work, why they’re needed, where to enable them, how to configure them, and what storage options are available.
We explore what Google Ad Topics is, how it functions, and how to disable it. Along the way, we discuss the related topics of Google FLoC, Privacy Sandbox, and the demise of third-party cookies.
Where to store credentials: browser or password manager? The latter, of course. Here’s why.
A few dozen malicious extensions — with a combined 87 million downloads — discovered in Google’s Chrome Web Store.
How scammers can hack your YouTube channel without knowing a password and second factor.
Learn how geolocation services work, and who learns of your location when your smartphone pins it down.