The (security) keys to our hearts
We’re showing our favorite digital security tools some love in our newsletter this week. Read up on why we love security keys.
We’re showing our favorite digital security tools some love in our newsletter this week. Read up on why we love security keys.
Let’s appreciate all that passcodes do for us by sending this week’s Valentines to them and their natural home, the password manager.
As heart-shaped chocolate boxes fill store aisles, allow us a moment to write a love letter to one of our favorite tools: Signal.
Confer is an open source, end-to-end encrypted chatbot.
If you got one of these emails, you weren’t alone.
Even if you don’t live in the Golden State, there are things you can do to opt out of invasive data broker companies.
How might Chrome put guardrails on AI ‘agents’?
The Pentagon inspector general’s report gives more details on the incident than ever before.
To protect your sensitive conversations, you’ll need to make sure your device is safe.
Researchers discovered phone numbers and, in some instances, associated profile photos and names through WhatsApp’s contact discovery tool
Data breaches are an unfortunate fact of modern life. While we can’t always control the security of the apps and services we use, there are some steps we can take to limit how much of our data is out there.
The names, email addresses, and chat histories of over 17,000 employees and external business contacts in the company’s Slack system were exposed thanks to one infected computer.
Despite their growing presence, AI-powered browsers aren’t ready for prime time when it comes to security
Online scamming has become an industry.
State-sponsored hacking collectives are myriad, but let’s focus on one
If you are traveling to the U.S. soon, you can be forgiven if your mind starts racing and the words on your screen start blurring together
That unsettled feeling you get when you are served an all-too-accurate advertisement? Data brokers at work
With Windows dropping support for Windows 10, you’ll need to upgrade — or consider another operating system entirely!
Apple’s new phone series has a secret superpower that will make mercenary spyware much harder to deploy
For one industry mining your data alongside telecom providers, it’s all about location, location, location
Right now it’s on Android beta, iOS and desktop are on their way soon, too.
Targeted malware is the sharpest edge of the spear, but simple steps also do a great deal to lower your risk of attack
The rise in device searches at U.S. ports of entry is consistent with ongoing upward trend — but there are things you can do to prepare
ICE officers used unsecured text messages to communicate about a target marked for deportation. Then, they added a stranger
AT&T rolled out a new feature to help customers lock down their accounts. But it’s not just AT&T — your phone company may have their own version as well