Where and how post-quantum cryptography is being used in 2024
Where and why quantum-resistant cryptography has already been implemented, and what compatibility issues it caused.
50 articles
Where and why quantum-resistant cryptography has already been implemented, and what compatibility issues it caused.
In the wake of Google and Facebook, Mozilla has introduced its own technology for replacing third-party cookies: let’s take a look at how privacy-preserving attribution works.
A new phishing technique uses progressive web apps (PWAs) to mimic browser windows with convincing web addresses to steal passwords.
Every time a browser interacts with an advertising tracker, a program called Googerteller emits a short sound.
With the EU’s Digital Markets Act having come into effect just days ago, both alternative app stores and true third-party browsers are set to appear on iPhones. How will this affect security, and what are iOS users losing?
How malicious extensions steal cryptocurrency, hijack accounts in games and social networks, manipulate search results, and display intrusive ads.
Everything you wanted to know about Google account passkeys: how they work, why they’re needed, where to enable them, how to configure them, and what storage options are available.
We explore what Google Ad Topics is, how it functions, and how to disable it. Along the way, we discuss the related topics of Google FLoC, Privacy Sandbox, and the demise of third-party cookies.
A few words on why desktop applications based on the Electron framework should be approached with caution.
Where to store credentials: browser or password manager? The latter, of course. Here’s why.
A few dozen malicious extensions — with a combined 87 million downloads — discovered in Google’s Chrome Web Store.
Alternatives to Google Chrome that take data privacy more seriously.
Why you should update to the latest version of Google Chrome, Microsoft Edge, Opera, Yandex Browser, Vivaldi, Brave and other Chromium-based browsers.
It’s common practice in many companies to keep work and personal information separate. But browser synchronization often remains unnoticed — and attackers are already exploiting it.
Have you ever come across the words Secure DNS or Private DNS in your smartphone settings and security apps? It’s best to keep this feature enabled – it has many advantages.
Using the most common families of malicious extensions as an example, we explain what can go wrong after installing a browser plug-in.
If you use an iPhone, it’s crucial to always install the Safari and WebKit updates, even if your browser of choice is Chrome, Firefox or something else. Here’s why.
The recent Google Chrome update patches 10 high severity vulnerabilities and a dozen of less critical bugs. Time to update your browser!
How to update Google Chrome right when you really need to, and what to do if you run into problems.
Here’s how to configure cookies in Chrome, Safari, Firefox and Edge.
Google released an update that patches three dangerous vulnerabilities in Google Chrome. Update your browser right away!