Browser extensions: never trust, always verify
Systematic measures and tools that organizations can use to defend against malicious browser extensions.
505 articles
Systematic measures and tools that organizations can use to defend against malicious browser extensions.
Which social networks mostly just display your posts to your friends, and which ones use them for AI training and ad targeting? We explore the 2025 privacy rankings for popular social media platforms.
Which messaging apps leak the least amount of your data, and provide the most control over your privacy? Today we discuss the latest rankings of popular communication platforms.
A step-by-step guide to deleting as much of your digital footprint as possible.
Artificial intelligence has given scammers a new set of tools for deception — from generating deepfakes, to instantly setting up phishing websites or fraudulent email campaigns. Let’s discuss the latest AI trends in phishing and scams — and how to stay safe.
A race between tech giants is unfolding before our very eyes. Who’ll be the first to transform the browser into an AI assistant app? As you test these new products, be sure to consider their enormous impact on security and privacy.
Deepfake videos, fraudulent Instagram and Facebook accounts, private WhatsApp chats: how Mark Zuckerberg’s social media platforms have become a primary tool for investment scammers.
Can you ditch passwords entirely for passkeys? We explore when it’s possible, and when it’s still a challenge.
First, don’t panic. Second, change your passwords. What else? Read this blogpost to protect your accounts.
Planning a safe digital detox: a checklist to help prepare for a vacation and unwind in peace.
A look at how Apple’s new child protection features work, what their limitations are, and why you still can’t do without third-party solutions.
This is your World Password Day reminder about how to create strong passwords and remember them.
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.
How to counter new privacy invasions by browser developers
We break down the most covert mechanism of smartphone surveillance using real-life examples.
How to avoid giving away your password to scammers when logging in to third-party sites or viewing “encrypted” or “confidential” documents.
A breakdown of the most high-profile data leaks ever: from Yahoo to RockYou2024.
In the wake of Google and Facebook, Mozilla has introduced its own technology for replacing third-party cookies: let’s take a look at how privacy-preserving attribution works.
Developers’ accounts are being hijacked using fake job offers sent from a legitimate GitHub address.
Training AI requires a colossal amount of data. Meta seems to have found a “brilliant” solution — using the personal data of its own users.
Cybercriminals are using genuine Facebook infrastructure to send phishing emails threatening to block accounts.