The sound of online trackers
Every time a browser interacts with an advertising tracker, a program called Googerteller emits a short sound.
505 articles
Every time a browser interacts with an advertising tracker, a program called Googerteller emits a short sound.
In response to EU regulations, WhatsApp will soon offer interoperability with other messengers. Do we need it? And is it secure?
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children’s online activities
Advertising firms boast that they can listen in on conversations through smart TVs and smartphones. Is this true, and, if so — how can you avoid being snooped on?
How malicious extensions steal cryptocurrency, hijack accounts in games and social networks, manipulate search results, and display intrusive ads.
Unused apps not only clutter your phone but also create a risk of personal data leakage, so it’s better to remove them. But what if an app can’t be uninstalled? There’s a workaround.
The decentralized Mastodon social network claims to be a different breed of social network. Here’s how it works and how to use it without compromising privacy and security.
Gadgets to help protect employees’ devices against hackers and other threats.
Here’s how to set up Threads to make your profile both private and secure.
How to secure chats on your phone, and why encryption alone is not enough
What web skimmers are, why you should keep a look out for them when shopping online, and how to protect yourself.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
Cybercriminals are increasingly using deepfakes in attacks against companies. What can we do to be safer?
What happens to your digital assets after you die, and how to make sure they fall into the right hands before you do.
Business is actively moving over to open-source solutions. How can the transition be made successfully, and what are the risks to consider?
Why scammers are more likely to target kids than hardcore gamers, how they do it, and what they want to steal
Cybercriminals are distributing a Trojan stealer under the guise of a ChatGPT desktop client for Windows. We delve into the details and ways to protect yourself.
What is a man-on-the-side attack, and how does it differ from a man-in-the-middle attack?
How to make sure a robot doesn’t spy on you, and can it function without internet access?