Watch the (verified) birdie, or new ways to recognize fakes
How to tell a real photo or video from a fake, and trace its provenance.
105 articles
How to tell a real photo or video from a fake, and trace its provenance.
Advertising firms boast that they can listen in on conversations through smart TVs and smartphones. Is this true, and, if so — how can you avoid being snooped on?
Cybersecurity trends to consider and new threats to protect against in 2024.
Espionage operations to hack corporate routers are now commonplace — and all organizations need to be aware of this.
A look at the pros and cons of updating Android — and ways to do it safely.
From watching foreign sports to finding the best online sales, we share the top high-speed VPN lifehacks.
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
We explain what the Fediverse is, how it works, where you can experience it today, and what to expect in the future.
What settings do you need to clear before getting rid of a gadget?
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?
The effectiveness of a sandbox largely depends on its ability to realistically imitate a working environment.
Learn how geolocation services work, and who learns of your location when your smartphone pins it down.
Linux and ESXi-based systems are increasingly falling victim to ransomware attacks. So how can you protect your servers?
If you want your smart home to do more good than harm, you should configure it correctly and secure it adequately. We review smart-home security in detail.
AI is going to have a tremendous impact on our lives. How can we get ready for it?
Chances are your home already contains a few smart components. But can you make them even smarter so as to reap yet more benefits from them?
What web beacons and tracker pixels are, what’s so obnoxious about them, and how to disable them.
Have you ever come across the words Secure DNS or Private DNS in your smartphone settings and security apps? It’s best to keep this feature enabled – it has many advantages.
New iPhone 14 wows with Emergency SOS feature for emergency calls via satellite. How does it work, and is it available on any other smartphone?
A new generation of chatbots creates coherent, meaningful texts. This can help out both cybercriminals and cyberdefenders.