Life-hack of the day: emoji passwords
Smiley passwords? Why ever not! The pros and cons of using emojis in passwords.
399 articles
Smiley passwords? Why ever not! The pros and cons of using emojis in passwords.
What personal information do modern cars collect about you, and how can you avoid surveillance or hacking of your vehicle?
We explore what Google Ad Topics is, how it functions, and how to disable it. Along the way, we discuss the related topics of Google FLoC, Privacy Sandbox, and the demise of third-party cookies.
Comparing user-friendly, secure alternatives to Zoom, Teams and Google Meet calling.
Researchers have found several spyware-infected versions of Telegram and Signal on Google Play.
The decentralized Mastodon social network claims to be a different breed of social network. Here’s how it works and how to use it without compromising privacy and security.
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
Gadgets to help protect employees’ devices against hackers and other threats.
Detailed tips for those who want to make money from streaming without feeding the trolls.
What settings do you need to clear before getting rid of a gadget?
Here’s how to set up Threads to make your profile both private and secure.
How to secure chats on your phone, and why encryption alone is not enough
Discussing privacy in Threads, and whether you should sign up to Zuckerberg’s Twitter clone.
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?
Smart feeders were invented to make life easier for pet owners; however, their vulnerabilities threaten not only owners’ privacy, but also the health of their pets.
Get all the benefits of a VPN — not just on your phone, but on your home computer, game console and smart TV too. The easiest way is to enable the VPN feature on your home router.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
Learn how geolocation services work, and who learns of your location when your smartphone pins it down.
Alternatives to Google Chrome that take data privacy more seriously.
What happens to your digital assets after you die, and how to make sure they fall into the right hands before you do.
Image-generating neural networks are already everywhere. What privacy risks do they pose?