Doxing — another online danger for women
Why it’s important to think about what data you share online, how to prevent being doxed, and what to do if you fail.
239 articles
Why it’s important to think about what data you share online, how to prevent being doxed, and what to do if you fail.
How to make sure a robot doesn’t spy on you, and can it function without internet access?
Why you shouldn’t trust a random period-tracking app, and what to look out for when choosing one.
Kaspersky VPN Secure Connection is the clear winner in tests of VPN performance, privacy, and transparency carried out by the independent IT-security research institute AV-TEST, and is recognized as the institute’s “Approved Virtual Private Network Solution”.
How things are privacy-wise on the social network Poparazzi.
Users of the Signal messaging app got hit by a hacker attack. We analyze what happened and why the attack demonstrates that Signal is reliable.
Google Play’s app descriptions have a new Data Safety section now. We explain why this isn’t such great news.
We explore the latest method for detecting hidden cameras and microphones described in one of the year’s best studies on personal security.
What is stalkerware, how widespread is the problem, and what is the relationship between domestic and digital abuse.
In the past year, a slew of cases in which criminals used AirTags to stalk people have come to light. We explain how this works and how to protect yourself.
Here’s how to configure cookies in Chrome, Safari, Firefox and Edge.
How to set app permissions in iOS 15 for maximum privacy and security.
A recent study shows that even “clean” Android smartphones collect a lot of information about their owners.
Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices.
How Zoom security is evolving, what threats are still current, and how developers plan to eliminate them.
How to respond to tracking requests in iOS, iPadOS and tvOS 14.5 — or opt out of app tracking completely.
Nowadays, building a dossier on any Internet user is easier than you might think. Learn about doxers and their methods.
Stalkerware activity dropped off during the pandemic, but it’s picking up again. How to deal with the threat.