Commercial spyware targets Signal, WhatsApp users
To protect your sensitive conversations, you’ll need to make sure your device is safe.
To protect your sensitive conversations, you’ll need to make sure your device is safe.
Researchers discovered phone numbers and, in some instances, associated profile photos and names through WhatsApp’s contact discovery tool
Data breaches are an unfortunate fact of modern life. While we can’t always control the security of the apps and services we use, there are some steps we can take to limit how much of our data is out there.
The names, email addresses, and chat histories of over 17,000 employees and external business contacts in the company’s Slack system were exposed thanks to one infected computer.
Despite their growing presence, AI-powered browsers aren’t ready for prime time when it comes to security
The answer may surprise you
Online scamming has become an industry.
State-sponsored hacking collectives are myriad, but let’s focus on one
This guide walks you through concrete steps to mitigate the risk of your location being tracked or identified by unwanted actors
If you are traveling to the U.S. soon, you can be forgiven if your mind starts racing and the words on your screen start blurring together
That unsettled feeling you get when you are served an all-too-accurate advertisement? Data brokers at work
With Windows dropping support for Windows 10, you’ll need to upgrade — or consider another operating system entirely!
Apple’s new phone series has a secret superpower that will make mercenary spyware much harder to deploy
Explore some options for backing up your phone privately and securely.
For one industry mining your data alongside telecom providers, it’s all about location, location, location
Right now it’s on Android beta, iOS and desktop are on their way soon, too.
Targeted malware is the sharpest edge of the spear, but simple steps also do a great deal to lower your risk of attack
The rise in device searches at U.S. ports of entry is consistent with ongoing upward trend — but there are things you can do to prepare
Yes, but before implementing steps to mitigate it, take a moment to ask: Who’s at risk, when does it matter, and what’s at stake?
ICE officers used unsecured text messages to communicate about a target marked for deportation. Then, they added a stranger
AT&T rolled out a new feature to help customers lock down their accounts. But it’s not just AT&T — your phone company may have their own version as well
This article was republished with permission from the Education Writers Association. It has been lightly edited for style and consistency.A question many journalists are asking themselves in today’s shifting digital landscape: How can I protect myself and my information online? That was also the focus of a session …
Mozilla warns of phishing attacks targeting developers of Firefox add-ons
Before journalists hit the ‘record’ button to capture interviews, it’s critical for them to think through the potential risks associated with recording and storing audio or video
Research shows that in recent months, Apple has notified at least a dozen Iranian iPhone users of targeted spyware, including those in civil society