
What to do if your WhatsApp account gets hacked
Eight signs your WhatsApp account has been stolen — and steps to recover and protect it.
488 articles
Eight signs your WhatsApp account has been stolen — and steps to recover and protect it.
The recent leak at major location-data broker, Gravy Analytics, shines a light on the implications of mass location-data collection.
We look into every method of hijacking WhatsApp, Telegram, and other messaging accounts – from quishing to fake gifts and viruses, and ways to protect yourself against them.
We examine a special breed of scams aimed at lovers, married couples, and singles. Read on to learn how to avoid falling for “Brad Pitt”.
Every file, video, etc. we share contains a lot of hidden additional information — metadata. What’s it for, and is it really necessary?
Hundreds of new gadgets and smart appliances are traditionally unveiled every January at the Consumer Electronics Show in Vegas. How will they affect our cybersecurity?
Mistakes to learn from in 2024 – and resolutions for a safer 2025.
The best privacy-focused services that make practical gifts for friends and family.
We explain how to detect if scammers have gained access to your Telegram account, and what to do about it.
Threats to data stored in Sync, pCloud, and other encrypted alternatives to Dropbox.
Scammers posing as buyers snatch one-time codes during online product demos.
A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.
Five dead simple tips to greatly improve your defenses against cybercriminals.
Web pages often disappear, move, or change content. How to keep them the way you want, or easily locate a web archive?
The Tor Browser is a bastion of online anonymity, yet even this tool can’t ensure complete privacy — and here’s why.
Discontinuing mandatory password rotations, banning outdated MFA methods, and other updates in the NIST SP 800-63 standards for digital account authentication and management.
A detailed guide to configuring privacy settings in the ASICS Runkeeper running app.
A vulnerability in Kia’s web portal made it possible to hack cars and track their owners. All you needed was the car’s VIN number or just its license plate number.
A detailed guide on setting up privacy in the adidas Running app.
Many popular online services these days require a selfie with your ID card or passport to register. We explore whether taking such photos is safe (spoiler: it’s not) and how to minimize the risks.
A detailed guide to configuring privacy settings in the MapMyRun fitness tracker.