Your personal cybersecurity checklist for 2026
Eight digital New Year’s resolutions you absolutely need to keep.
505 articles
Eight digital New Year’s resolutions you absolutely need to keep.
We break down a new scam that leverages Telegram Mini Apps, and explain how to avoid taking the bait.
A new wave of ClickFix attacks spreading a macOS infostealer are posting malicious user guides on the official ChatGPT website by piggybacking the chatbot’s chat-sharing feature.
The Whisper Leak attack allows its perpetrator to guess the topic of your conversation with an AI assistant — without decrypting the traffic. We explore how this is possible, and what you can do to protect your AI chats.
Millions of websites based on React and Next.js contain an easy-to-exploit vulnerability that can lead to complete server takeover. How to check if your server is vulnerable, and protect corporate web assets?
Here’s how to mitigate the risks of targeted attacks on your organization’s mail servers.
We’re going bargain hunting in a new way: armed with AI. In this post: examples of effective prompts.
Pixnapping is an Android vulnerability discovered by researchers that allows apps to steal passwords, one-time codes, and other confidential information from the screen without any special permissions from the operating system. How does it work, and what can you do to protect yourself?
You’ve received a threatening email. What’s your next move?
Which social networks mostly just display your posts to your friends, and which ones use them for AI training and ad targeting? We explore the 2025 privacy rankings for popular social media platforms.
Which messaging apps leak the least amount of your data, and provide the most control over your privacy? Today we discuss the latest rankings of popular communication platforms.
A step-by-step guide to deleting as much of your digital footprint as possible.
Any game based on the popular Unity engine made in the last eight years can allow attackers to get into your computer or smartphone. Here’s what to do about it.
A race between tech giants is unfolding before our very eyes. Who’ll be the first to transform the browser into an AI assistant app? As you test these new products, be sure to consider their enormous impact on security and privacy.
How 5G smartphone connectivity can be compromised, and what it means for subscribers.
How attackers can hijack your computer through its webcam — and how to stop it.
Thousands of companies exist for one purpose only: to collect and resell information about each of us. How do they do it, how can you limit data collection, and how do you delete what’s already been collected?
Here’s what any responsible parent should do if their kid wants to be a blogger.
Brushing, quishing, and other fraud schemes that begin with the delivery by courier of a product you never ordered.
We look at how AI can help you plan your vacation — and what can go wrong.
Companies need to build a culture of security, but this is impossible when employees are afraid to discuss incidents or suggest improvements.