How Zoom moved toward end-to-end encryption
How Zoom security is evolving, what threats are still current, and how developers plan to eliminate them.
460 articles
How Zoom security is evolving, what threats are still current, and how developers plan to eliminate them.
Dave and Ahmed talk about “analog” workers, sketchy Android apps, REvil, APT28, and the Apex Legends hack.
Everything you need to know about the privacy-focused messaging app.
Dave, Jeff, and Ahmed talk WhatsApp, privacy, ransomware, and more on this week’s podcast.
New research shows that whilst European’s are keen to take control of their personal data, many of them feel lost in how to go about it.
How to respond to tracking requests in iOS, iPadOS and tvOS 14.5 — or opt out of app tracking completely.
Nowadays, building a dossier on any Internet user is easier than you might think. Learn about doxers and their methods.
As technology moves forward, questions are being raised about augmentation, privacy and security.
Stalkerware activity dropped off during the pandemic, but it’s picking up again. How to deal with the threat.
Facebook lets you manage the data it collects from third-party websites and apps. Here’s how.
How to set up and use dating apps safely and privately.
Jeff and Dave sit down with the team over at Threatpost to talk about data, privacy, and the future of the Internet.
Jeff and Dave talk with Marco Preuss about his recent research on secondhand devices.
The terms are sometimes confused; we help unravel the differences.
We explain why secret chats in Telegram are a must, and how to configure security and privacy.
Researchers have created an extension to learn about the information websites collect to “fingerprint” browsers.
Anyone can experience in-game bullying. What to do if aggressive gamers target you.