
What kids are doing online
Ever wondered why kids these days spend so much time online? Most parents do. So we found out what they’re actually doing there (spoiler: nothing bad).
504 articles
Ever wondered why kids these days spend so much time online? Most parents do. So we found out what they’re actually doing there (spoiler: nothing bad).
Researchers find 57 potentially dangerous browser extensions in the Chrome Web Store. Here’s why they’re dangerous, and how not to fall victim.
Can your photos be viewed, stolen, or deleted when your smartphone is plugged into a public charging station? As it turns out — yes!
Our experts at GReAT have uncovered a dangerous vulnerability in a smart-home control app that allowed attackers to disable physical security systems.
Planning a safe digital detox: a checklist to help prepare for a vacation and unwind in peace.
A look at how Apple’s new child protection features work, what their limitations are, and why you still can’t do without third-party solutions.
A year after its disastrous announcement, Microsoft is finally launching its AI-powered Recall feature on Copilot+ PCs. Is the new version secure, and what’s actually changed?
Why highlighted links to visited sites can be dangerous, and why a solution was over 20 years in the making.
This is your World Password Day reminder about how to create strong passwords and remember them.
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.
We explain where and how to view porn without risking the security of your devices or your wallet.
A dozen short and simple tips on how to use WhatsApp, Telegram, Signal, iMessage, WeChat, and other messaging apps safely and hassle-free.
Apple’s Find My network can be exploited to remotely track other vendors’ Android, Windows, and Linux devices.
How to counter new privacy invasions by browser developers
We dive into the mechanics of the controversial nude-scanning app that has mysteriously materialized on a billion phones.
We break down the most covert mechanism of smartphone surveillance using real-life examples.
Eight signs your WhatsApp account has been stolen — and steps to recover and protect it.
The recent leak at major location-data broker, Gravy Analytics, shines a light on the implications of mass location-data collection.
We look into every method of hijacking WhatsApp, Telegram, and other messaging accounts – from quishing to fake gifts and viruses, and ways to protect yourself against them.
We examine a special breed of scams aimed at lovers, married couples, and singles. Read on to learn how to avoid falling for “Brad Pitt”.
Every file, video, etc. we share contains a lot of hidden additional information — metadata. What’s it for, and is it really necessary?