Are your Bluetooth headphones spying on you?
Breaking down the WhisperPair attack, which allows victims to be tracked via ordinary Bluetooth headphones.
110 articles
Breaking down the WhisperPair attack, which allows victims to be tracked via ordinary Bluetooth headphones.
Thousands of companies exist for one purpose only: to collect and resell information about each of us. How do they do it, how can you limit data collection, and how do you delete what’s already been collected?
Adjust your daily routines to leave as little data about yourself online as possible.
This guide dives into using passkeys to sign in from someone else’s computer, storing them on a removable device, and transferring between devices.
Can you ditch passwords entirely for passkeys? We explore when it’s possible, and when it’s still a challenge.
Newly discovered vulnerabilities in AirPlay allow attacks on Apple devices and other AirPlay-enabled products over Wi-Fi – including zero-click exploits.
A look at how Apple’s new child protection features work, what their limitations are, and why you still can’t do without third-party solutions.
Cybercriminals are inventing new ways to swipe money from payment cards by using credentials phished online or over the phone. Sometimes, just holding your card to your phone is enough to leave you penniless.
Apple’s Find My network can be exploited to remotely track other vendors’ Android, Windows, and Linux devices.
We break down the most covert mechanism of smartphone surveillance using real-life examples.
The recent leak at major location-data broker, Gravy Analytics, shines a light on the implications of mass location-data collection.
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
We’ve discovered apps in the official Apple and Google stores that steal cryptocurrency wallet data by analyzing photos.
Banshee stealer, a macOS stealer that emerged last year, is now roaming free on the Web, infecting Mac users and gaining new capabilities. How to protect yourself?
We explain how to detect if scammers have gained access to your Telegram account, and what to do about it.
A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.
Recent research describes a method for snooping on what Apple Vision Pro users enter on the virtual keyboard.
Worried about your access to Telegram and its privacy after Pavel Durov’s arrest? Here’s what you should (and shouldn’t!) do right now.
Small beacons like AirTag make it easy to find a lost wallet or keys — but are also often used for covert tracking. Now you can detect stalkers and protect yourself — regardless of what kind of smartphone you have.
Although Microsoft has radically revised the rollout plan for its controversial Recall feature, cybersecurity teams can’t afford to ignore the issue of “AI onlookers.
The updated VPN & Antivirus by Kaspersky for iOS now supports Apple Shortcuts and Siri. We explain what you can do with this feature, and how to set it up.