Lumos: IoT device detection system
We explore the latest method for detecting hidden cameras and microphones described in one of the year’s best studies on personal security.
396 articles
We explore the latest method for detecting hidden cameras and microphones described in one of the year’s best studies on personal security.
We cite an interesting study on how the mute button actually works in teleconferencing services, and discuss privacy in the web conferencing era.
What is stalkerware, how widespread is the problem, and what is the relationship between domestic and digital abuse.
Here’s how to configure cookies in Chrome, Safari, Firefox and Edge.
We explain what a smartphone’s ToF sensor is and how researchers from Singapore propose using it to find hidden cameras.
How to set app permissions in iOS 15 for maximum privacy and security.
With new features, Kaspersky VPN Secure Connection now does more to protect your Internet activity.
A recent study shows that even “clean” Android smartphones collect a lot of information about their owners.
Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices.
We explore the security settings of one of the most popular chat platforms on the planet.
How Zoom security is evolving, what threats are still current, and how developers plan to eliminate them.
Dave and Ahmed talk about “analog” workers, sketchy Android apps, REvil, APT28, and the Apex Legends hack.
Everything you need to know about the privacy-focused messaging app.
Dave, Jeff, and Ahmed talk WhatsApp, privacy, ransomware, and more on this week’s podcast.
How to respond to tracking requests in iOS, iPadOS and tvOS 14.5 — or opt out of app tracking completely.
Nowadays, building a dossier on any Internet user is easier than you might think. Learn about doxers and their methods.
Stalkerware activity dropped off during the pandemic, but it’s picking up again. How to deal with the threat.