The perils of short links
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
20 articles
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
Stealing data from an isolated network by manipulating the voltage switching converter.
How paranoid employers and jealous partners can spy on you, and why chip bags are best left to movie heroes.
Six severe vulnerabilities in iMessage that allow remote code execution and data stealing with no user interaction? Sounds like a good reason to update to iOS 12.4 as soon as possible.
Commercial spying apps — stalkerware — are not malware in the proper sense of the term, but it’s better to avoid using them anyway.
The Skygofree Trojan comes with a powerful array of spyware features, some unique — like turning on audio recording by geolocation and stealing private messages.
Attentive listeners such as Apple Siri and Amazon Echo have settled down in our houses. What’s the harm?
A story of two amateurs who were able to spy on Italian officials for years without getting caught.
Facebook is going to use your WhatsApp data to tune its advertising, but for now you can opt out of this deal.
Your smartphone knows everything about you: whom you call and what messages you send, which websites you visit and what photos you take, including even when and where you do it. This data may be used against you.
In the past, technologies that see through walls were only available for some governmental services. Today, the situation has changed due to technological advancements that have contributed to price decreases.
Devices that have functions of special importance, or that contain top-secret information, are not usually connected to the Internet. However, going offline is not the ultimate protection.
It turned out that Lenovo’s laptops had been shipped with an adware called Superfish. It possibly allows eavesdropping on encrypted connections
Kaspersky Lab researchers uncovered Desert Falcons, the first exclusively Arabic APT group, presenting their findings at the Security Analyst Summit in Cancun.
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we list the low scorers.
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we detail the top scorers.
Your iPhone runs hidden monitoring services. Who uses them, and for what purpose?
There were long time rumors about iPhone malware used to spy on smartphone owners, but now it’s official ―Kaspersky Lab researchers discovered a real life sample of this Trojan.