How to protect yourself from Bluetooth stalking and more
A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.
435 articles
A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.
A detailed guide to configuring privacy settings in the ASICS Runkeeper running app.
A vulnerability in Kia’s web portal made it possible to hack cars and track their owners. All you needed was the car’s VIN number or just its license plate number.
A detailed guide on setting up privacy in the adidas Running app.
We share our experience on the optimal use of AI models in the SOC of our Kaspersky MDR service.
A detailed guide to configuring privacy settings in the MapMyRun fitness tracker.
This guide will walk you through the essential privacy settings in the Nike Run Club training app.
Phishers have adopted another trick: they send emails pretending to be from Docusign with a fake link to a document that the recipient must sign.
Want to keep your runs, rides, and hikes private on Strava? This guide will walk you through the essential privacy settings in this popular fitness app.
Running apps know a lot about their users, so it’s worth setting them up to ensure your data doesn’t fall into the wrong hands. Here’s how.
Recent research describes a method for snooping on what Apple Vision Pro users enter on the virtual keyboard.
Why cybersecurity in education is critical, and how to protect schools from attacks.
We explore the root causes of the talent crisis in the cybersecurity industry and look for possible solutions.
The digital age has made meeting new people easier, but it also brings new risks. Online dating, social media, and messaging apps can open the door to both exploitation and abuse in relationships.
Where and why quantum-resistant cryptography has already been implemented, and what compatibility issues it caused.
Worried about your access to Telegram and its privacy after Pavel Durov’s arrest? Here’s what you should (and shouldn’t!) do right now.
Researchers have discovered several potential attack vectors targeting bicycles fitted with Shimano Di2 wireless gear-shifting system.
Fraudsters are using AI-generated digital clones to bypass Know Your Customer (KYC) procedures and open money laundering accounts.
Telegram bot sells subscriptions to phishing tools to hack Microsoft 365 accounts, including 2FA bypass.
Small beacons like AirTag make it easy to find a lost wallet or keys — but are also often used for covert tracking. Now you can detect stalkers and protect yourself — regardless of what kind of smartphone you have.