How (not) to play tanks and catch a backdoor
Cybercriminals have devised a new ruse: luring gamers to a modish crypto tank-game to gain full access to their computers.
285 articles
Cybercriminals have devised a new ruse: luring gamers to a modish crypto tank-game to gain full access to their computers.
The Tor Browser is a bastion of online anonymity, yet even this tool can’t ensure complete privacy — and here’s why.
A detailed guide to configuring privacy settings in the ASICS Runkeeper running app.
A vulnerability in Kia’s web portal made it possible to hack cars and track their owners. All you needed was the car’s VIN number or just its license plate number.
A detailed guide on setting up privacy in the adidas Running app.
Many popular online services these days require a selfie with your ID card or passport to register. We explore whether taking such photos is safe (spoiler: it’s not) and how to minimize the risks.
A detailed guide to configuring privacy settings in the MapMyRun fitness tracker.
This guide will walk you through the essential privacy settings in the Nike Run Club training app.
Want to keep your runs, rides, and hikes private on Strava? This guide will walk you through the essential privacy settings in this popular fitness app.
Running apps know a lot about their users, so it’s worth setting them up to ensure your data doesn’t fall into the wrong hands. Here’s how.
Recent research describes a method for snooping on what Apple Vision Pro users enter on the virtual keyboard.
The digital age has made meeting new people easier, but it also brings new risks. Online dating, social media, and messaging apps can open the door to both exploitation and abuse in relationships.
We’ve discovered a new Trojan that’s very selective about its victims.
Even in 2024, the world is rife with digital paranoia and superstition. Is my smartphone tracking me? Will incognito mode make me invisible? This post answers these and lots of other related questions.
A breakdown of the most high-profile data leaks ever: from Yahoo to RockYou2024.
In the wake of Google and Facebook, Mozilla has introduced its own technology for replacing third-party cookies: let’s take a look at how privacy-preserving attribution works.
Training AI requires a colossal amount of data. Meta seems to have found a “brilliant” solution — using the personal data of its own users.
Almost six out of ten passwords can be cracked in less than an hour using either a modern graphics card or cloud services. All it costs is a few dollars and some free time. How this is possible and what to do about it is the topic of our study.
We discuss key aspects of WhatsApp’s security and privacy, and how to configure this messenger to enhance protection.
Scammers posing as buyers are targeting sellers on message boards. We explain the details of this scam, and offer tips for safe online trading.