What to do if your Telegram account is hacked
We explain how to detect if scammers have gained access to your Telegram account, and what to do about it.
242 articles
We explain how to detect if scammers have gained access to your Telegram account, and what to do about it.
A step-by-step guide for those who may be tracked through stalker apps or wireless beacons.
We’ve updated the design of our password manager’s mobile version. Storing and managing passwords is now even more convenient.
Our products are no longer available on Google Play. We explain why this happened, and how to install or update our apps for Android.
At risk are users of modified versions of Spotify, WhatsApp, Minecraft, and other apps from Google Play.
Worried about your access to Telegram and its privacy after Pavel Durov’s arrest? Here’s what you should (and shouldn’t!) do right now.
Small beacons like AirTag make it easy to find a lost wallet or keys — but are also often used for covert tracking. Now you can detect stalkers and protect yourself — regardless of what kind of smartphone you have.
The masterminds behind the colossal botnet encompassing 19 million IP addresses used free VPN services as bait to lure unsuspecting users.
Google has unveiled new privacy and security features coming to Android 15. We take a look at the innovations in the upcoming operating system update.
We explore whether it’s possible to reveal all your secrets via your smartphone’s on-screen keyboard.
Advertising firms’ extensive collection of personal data is becoming of great use to intelligence agencies. So how to guard against mass surveillance?
Today we dive into note-taking apps, to-do lists, and diaries that use end-to-end encryption: privacy-focused cousins of popular apps like OneNote, Evernote, Apple’s Notes, and Google Keep.
Google updates the Android Location History feature. Why the change, and how will this work in the future?
How unfortunate investors in commodities, cryptocurrency, and other assets get scammed in apps found in official stores.
A researcher has discovered a vulnerability in the Bluetooth protocol implementations for Android, macOS, iOS, and Linux, allowing devices to be hacked remotely.
Android 13 and 14 have a feature called Restricted Settings. We explain its purpose, and how malicious applications bypass it.
Unused apps not only clutter your phone but also create a risk of personal data leakage, so it’s better to remove them. But what if an app can’t be uninstalled? There’s a workaround.
The Nothing Chats app from Nothing Phone promised to be the iMessage for Android, but in less than 24 hours it was removed from Google Play due to a shocking lack of security.
A look at the pros and cons of updating Android — and ways to do it safely.
Our researchers discovered spyware-infected WhatsApp modifications distributed through Telegram channels and websites with WhatsApp mods.