People in other parts of the world also have the option to flip on DNS encryption
Do social media listen in on our conversations in order to target us with ads? Or are we just a bit paranoid?...
Other leaked records include videos, facial and body scans, as well as a range of patients' personal data
Windows 10 is by far the most acknowledged Windows operating system. Microsoft rolls out updates frequently to ensure bugs are fixed and...
As Facebook turns 16, we look at how to keep your personal information safe from prying eyes
The browser's anti-tracking feature could apparently give access to users’ browsing habits
Some of the most popular dating services may be violating GDPR or other privacy laws
Are you looking to hide in plain sight? Here’s a rundown of three options for becoming invisible online
The company will also soon launch anti-fingerprinting measures aimed at detecting and mitigating covert tracking and workarounds
Vendors are allowed to have 90 days to fix bugs, under adjustments to the transparency policies of Google Project Zero. Project Zero,...
A Xiaomi security camera owner reports receiving random images from strangers’ homes
As if it wasn’t hard enough to have their data compromised, businesses who fell victim to Maze ransomware are now facing another...
A variety of sensitive information has been there for the taking due to an unsecured cloud storage container
What issues would face scanning attached to a mobile device resolve and, if used correctly, would it make the incursion into my...
Venafi has discovered over 100,000 typosquatted domains with legitimate TLS certificates that appear to be aimed at large traders, a company that...
A recent update to Facebook’s iOS app introduced a bug that had some users worried
If you want to boost usability, increase conversions, improve bounce rates, and rank higher on search engines, you must consider site speed....
Do you know what kind of data your streaming device may be collecting while you binge watch?
A Content Delivery Network (CDN) is a collection of interconnected computers that provide web content quickly to different users. It caches or...
Why you should ensure that all those apps on your smartphone only run with the permissions they reasonably need to do their...
It is important to remember that implementing incident response steps is a process and not an isolated event. For a truly successful...