580 articles
The story of Marion, a computer user from Germany whose files were encrypted by ransomware — and how she got them back without paying ransom.
When web services collapse, they bury users’ data under their ruins. How can we solve this problem?
Social media and ‘likes’ can hurt our relationships and everyday life. Here is how it happens.
What would you do to get more likes on a social network? Take our quiz and see if you’re hooked on likes.
An unconventional Android Trojan does not do anything to your smartphone; instead it hacks the Wi-Fi hotspot the smartphone is connected to.
We share our lives on social media. What happens if we get locked out?
The tracking tools used by digital marketers are so ubiquitous that it’s really hard to avoid mass Web surveillance. However, our Private Browsing can help you protect your privacy.
More than 70% of active Internet users have considered quitting their social networks. What do they have to lose?
Ransoc ransomware gathers data from victim’s social networks and hard drives, and uses it to blackmail victims.
A study reveals that people are tired of social networks, but keep using them because they can’t break the ties.
Photo files typically contain additional data on shooting conditions, including a geotag. What happens to this data when the photo is published online?
Careless behavior online can have devastating personal and financial consequences. Here are seven common shortcuts to avoid.
Social networking sites know a lot more about you than what you post. These two tools can help you figure out how much more.
What are older people doing online, and are they aware of the threats out there?
Germany and India officially challenge changes to WhatsApp’s data-sharing policy.
i-Dressup, a community for teenage girls, is actively leaking passwords in plain text.
What is the fundamental difference between Auto 2.0 and Auto 3.0? Technically, they’re the same. From the viewpoint of the car owner, however, the connection of one or more electronic units to the Internet provides pleasant and useful services — as well as Internet access while en route. But to a cybersecurity expert, the difference is huge: remote access to a car and its internal systems is bound to have major consequences.
When Google announced Allo, we thought the search giant was finally paying attention to users’ concerns about privacy. Reality turned to be quite different.