The perils of short links
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
19 articles
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
Stealing data from an isolated network by manipulating the voltage switching converter.
How paranoid employers and jealous partners can spy on you, and why chip bags are best left to movie heroes.
Six severe vulnerabilities in iMessage that allow remote code execution and data stealing with no user interaction? Sounds like a good reason to update to iOS 12.4 as soon as possible.
Commercial spying apps — stalkerware — are not malware in the proper sense of the term, but it’s better to avoid using them anyway.
The Skygofree Trojan comes with a powerful array of spyware features, some unique — like turning on audio recording by geolocation and stealing private messages.
Attentive listeners such as Apple Siri and Amazon Echo have settled down in our houses. What’s the harm?
A story of two amateurs who were able to spy on Italian officials for years without getting caught.
Facebook is going to use your WhatsApp data to tune its advertising, but for now you can opt out of this deal.
Your smartphone knows everything about you: whom you call and what messages you send, which websites you visit and what photos you take, including even when and where you do it. This data may be used against you.
In the past, technologies that allow to see through walls were available only for some governmental services. Today, the situation changes owing to technological advancement that is followed by the price decrease.
Any system that is connected to the Internet is always subject to threats, no matter how well it is protected. This assumption is well-known to any teenager today. No software
On February 19th of 2015, it came out that Lenovo’s laptops had been shipped with an adware Superfish preinstalled. There are two major problems with this issue. The first one is
Last week we looked at the Electronic Frontier Foundation’s secure messaging scorecard and made a list of nine mobile and Internet messaging services that scored well on privacy and security. Today, we’re
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we detail the top scorers.
Your iPhone runs hidden monitoring services. Who uses them, and for what purpose?
There were long time rumors about iPhone malware used to spy on smartphone owners, but now it’s official ―Kaspersky Lab researchers discovered a real life sample of this Trojan.