
Geolocation data brokers: What they do and what happens when they leak
The recent leak at major location-data broker, Gravy Analytics, shines a light on the implications of mass location-data collection.
28 articles
The recent leak at major location-data broker, Gravy Analytics, shines a light on the implications of mass location-data collection.
Unused apps not only clutter your phone but also create a risk of personal data leakage, so it’s better to remove them. But what if an app can’t be uninstalled? There’s a workaround.
Cybercriminals can target anyone who uses your applications; keeping users safe is also partly up to you.
How to respond to tracking requests in iOS, iPadOS and tvOS 14.5 — or opt out of app tracking completely.
Mobile apps can track your location and sell the data to third parties. What can you do about it?
Privacy International talks about period-tracking apps and the perils of sharing secrets with apps.
Learn about Android device identifiers and how apps abuse them to make more money on ads.
Basically, all apps collect some information about you. Using the services AppCensus and Exodus, you can find out what exactly is collected.
Apps that demand access to calls and SMS messaging without good reason are being kicked off Google Play. We explain what threats might arise.
Systems designed to guard against car theft can be used to track, immobilize, and steal vehicles.
We explain the types of malware that can take control of your device, and the dangers of multifunctional infection.
Do you follow the news? The news may also be following you. ZooPark spyware targets those partial to politics.
Even very popular apps display ads using third-party code, which can transmit personal data unencrypted.
Harmless toy or a way to phish for personal data?
Today’s smartphones are full-fledged computers much more powerful than the desktops you used 10 years ago. Your device is very likely to contain data the cybercriminals are after, like banking data.
Despite our dismay about too much computer in our kids’ lives, it’s a process, which cannot be stopped now. Since we cannot stop it, let’s steer it in the right direction!
Predictability of human beings can barely be overestimated when it comes to passwords. But what about lock screen patterns, are we predictable as well when we’re creating them?
A bottle of good scotch in exchange for a day without a smartphone? Would I dare? That’s a piece of cake! That’s what I thought. As it turned out, it’s not that simple nowadays
Did you have a nice chat with your friends last time you met them? Or were you all only taking pictures of the meals for Instagram, and commenting each other on Facebook?
Major social networks have been lately known to either unbundle their functionality into multiple apps, or buy other apps and not integrate their functionality into the main one
According to Nielsen’s year-old report on the state of mobile technology, users across multiple developed markets have one thing in common: they spend roughly 40% of their actual screen time