
Geolocation data brokers: What they do and what happens when they leak
The recent leak at major location-data broker, Gravy Analytics, shines a light on the implications of mass location-data collection.
33 articles
The recent leak at major location-data broker, Gravy Analytics, shines a light on the implications of mass location-data collection.
Unused apps not only clutter your phone but also create a risk of personal data leakage, so it’s better to remove them. But what if an app can’t be uninstalled? There’s a workaround.
Cybercriminals can target anyone who uses your applications; keeping users safe is also partly up to you.
How to respond to tracking requests in iOS, iPadOS and tvOS 14.5 — or opt out of app tracking completely.
Mobile apps can track your location and sell the data to third parties. What can you do about it?
Privacy International talks about period-tracking apps and the perils of sharing secrets with apps.
Learn about Android device identifiers and how apps abuse them to make more money on ads.
Basically, all apps collect some information about you. Using the services AppCensus and Exodus, you can find out what exactly is collected.
Apps that demand access to calls and SMS messaging without good reason are being kicked off Google Play. We explain what threats might arise.
Systems designed to guard against car theft can be used to track, immobilize, and steal vehicles.
We explain the types of malware that can take control of your device, and the dangers of multifunctional infection.
Do you follow the news? The news may also be following you. ZooPark spyware targets those partial to politics.
Even very popular apps display ads using third-party code, which can transmit personal data unencrypted.
Harmless toy or a way to phish for personal data?
Facebook will now let Google index the mobile app from the search engine.
Today’s smartphones are full-fledged computers much more powerful than the desktops you used 10 years ago. Your device is very likely to contain data the cybercriminals are after, like banking data.
Despite our dismay about too much computer in our kids’ lives, it’s a process, which cannot be stopped now. Since we cannot stop it, let’s steer it in the right direction!
Predictability of human beings can barely be overestimated when it comes to passwords. But what about lock screen patterns, are we predictable as well when we’re creating them?
A bottle of good scotch in exchange for a day without a smartphone? Would I dare? That’s a piece of cake! That’s what I thought. As it turned out, it’s not that simple nowadays
How did you like it the last time you saw your friends? Did you have a nice chat with them? Or were you all only taking pictures of your meals to post them on Instagram and talking to each other on Facebook?
Technology dependence cannot be beaten, but the technologies can be laid out properly. With good system architecture and a proper security policy, the number of bottlenecks is brought to an absolute minimum.