A digital last-will-and-testament: who gets your accounts?
What happens to your digital assets after you die, and how to make sure they fall into the right hands before you do.
460 articles
What happens to your digital assets after you die, and how to make sure they fall into the right hands before you do.
Image-generating neural networks are already everywhere. What privacy risks do they pose?
Generation X and Millennials putting themselves at risk online despite knowing the dangers
How to set up modern VPN services to significantly speed up the connection and access new content securely.
Could someone be viewing your private photos while your device is being repaired?
Do you edit images in Windows 11 or on Google Pixel? Due to a developer error, hidden information in cropped or edited pictures can be recovered.
If you want your smart home to do more good than harm, you should configure it correctly and secure it adequately. We review smart-home security in detail.
What web beacons and tracker pixels are, what’s so obnoxious about them, and how to disable them.
Have you ever come across the words Secure DNS or Private DNS in your smartphone settings and security apps? It’s best to keep this feature enabled – it has many advantages.
New iPhone 14 wows with Emergency SOS feature for emergency calls via satellite. How does it work, and is it available on any other smartphone?
In a new study, security experts explore eavesdropping on phone conversations through a bug inside almost every smartphone. How dangerous is it?
And more importantly — how to stop your passwords from being used by cybercriminals.
We look at how secure password managers are against hacks, and how to protect your passwords as much as possible.
Here are a few tips on how to make your Untappd profile as private and secure as possible.
In late 2022, Apple announced a raft of new data protection features. Why does that matter to users?
Received an attractive job offer from a stranger? Be careful! It could be a scam…
A few words about why Telegram isn’t as secure as its developers boast.
Why it’s important to think about what data you share online, how to prevent being doxed, and what to do if you fail.
What to do if your secret messenger isn’t secret enough.
How to make sure a robot doesn’t spy on you, and can it function without internet access?