
How to track anyone via the Find My network
Apple’s Find My network can be exploited to remotely track other vendors’ Android, Windows, and Linux devices.
138 articles
Apple’s Find My network can be exploited to remotely track other vendors’ Android, Windows, and Linux devices.
How to counter new privacy invasions by browser developers
We dive into the mechanics of the controversial nude-scanning app that has mysteriously materialized on a billion phones.
A vulnerability in Google OAuth allows attackers to access accounts of defunct organizations through abandoned domains.
We break down the most covert mechanism of smartphone surveillance using real-life examples.
The recent leak at major location-data broker, Gravy Analytics, shines a light on the implications of mass location-data collection.
We’ve discovered apps in the official Apple and Google stores that steal cryptocurrency wallet data by analyzing photos.
Hundreds of new gadgets and smart appliances are traditionally unveiled every January at the Consumer Electronics Show in Vegas. How will they affect our cybersecurity?
A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.
Worried about your access to Telegram and its privacy after Pavel Durov’s arrest? Here’s what you should (and shouldn’t!) do right now.
In the wake of Google and Facebook, Mozilla has introduced its own technology for replacing third-party cookies: let’s take a look at how privacy-preserving attribution works.
Small beacons like AirTag make it easy to find a lost wallet or keys — but are also often used for covert tracking. Now you can detect stalkers and protect yourself — regardless of what kind of smartphone you have.
Although Microsoft has radically revised the rollout plan for its controversial Recall feature, cybersecurity teams can’t afford to ignore the issue of “AI onlookers.
The exact location of your router is publicly available through global Wi-Fi geolocation databases. Let’s explore why this is necessary, and the risks it entails and how to mitigate them.
A new phishing technique uses progressive web apps (PWAs) to mimic browser windows with convincing web addresses to steal passwords.
How to use private browsing mode, what it doesn’t protect against, and why Google is deleting five billion dollars’ worth of user data.
Google has unveiled new privacy and security features coming to Android 15. We take a look at the innovations in the upcoming operating system update.
Every time a browser interacts with an advertising tracker, a program called Googerteller emits a short sound.
Advertising firms’ extensive collection of personal data is becoming of great use to intelligence agencies. So how to guard against mass surveillance?
Google OAuth allows to create phantom Google accounts — uncontrollable by corporate Google Workspace administrators.
Advertising firms boast that they can listen in on conversations through smart TVs and smartphones. Is this true, and, if so — how can you avoid being snooped on?