Report: Smartphone users are wary of privacy breaches
As the use of Smartphones continues to grow in the U.S., the majority of users are very sensitive about how much personal information they have to share when downloading apps
750 articles
As the use of Smartphones continues to grow in the U.S., the majority of users are very sensitive about how much personal information they have to share when downloading apps
We explain how to detect if scammers have gained access to your Telegram account, and what to do about it.
Is a taped-over webcam or phonecam a sign of paranoia – or smart thinking?
Cybercriminals are enticing Telegram users with free subscriptions. Is this an unexpected act of generosity or just another scam?
Five dead simple tips to greatly improve your defenses against cybercriminals.
Web pages often disappear, move, or change content. How to keep them the way you want, or easily locate a web archive?
The Tor Browser is a bastion of online anonymity, yet even this tool can’t ensure complete privacy — and here’s why.
Discontinuing mandatory password rotations, banning outdated MFA methods, and other updates in the NIST SP 800-63 standards for digital account authentication and management.
Many popular online services these days require a selfie with your ID card or passport to register. We explore whether taking such photos is safe (spoiler: it’s not) and how to minimize the risks.
Why international standards are important, and how Kaspersky contributes to IoT standardization.
Episode 365 has chatbots, CAPTCHA, Trump and yet more GDPR woes!
Recent research describes a method for snooping on what Apple Vision Pro users enter on the virtual keyboard.
The digital age has made meeting new people easier, but it also brings new risks. Online dating, social media, and messaging apps can open the door to both exploitation and abuse in relationships.
Our developments, products, research, patents and expert teams harnessed for AI.
Episode 361 looks at the right to disconnect, Black Myth: Wukong and much more!
Even in 2024, the world is rife with digital paranoia and superstition. Is my smartphone tracking me? Will incognito mode make me invisible? This post answers these and lots of other related questions.
The U.S. National Institute of Standards and Technology (NIST) has issued the first post-quantum encryption standards — FIPS 203, FIPS 204, and FIPS 205.
Worried about your access to Telegram and its privacy after Pavel Durov’s arrest? Here’s what you should (and shouldn’t!) do right now.
Going on vacation? We’ve compiled a traveler’s guide to help you have an enjoyable safe time and completely get away from the routine.
Small beacons like AirTag make it easy to find a lost wallet or keys — but are also often used for covert tracking. Now you can detect stalkers and protect yourself — regardless of what kind of smartphone you have.