The Internet of Stranger Things came to life in the recent case of a cuddly connected toy, raising wider and deeper questions about cybersecurity, privacy, and the future of digital technology.
Is your smart TV selling data about what you watch, without asking? As the US FTC goes after one TV maker, it may be time to check.
A security researcher has described how he uncovered a severe security hole in dozens of different Netgear routers, meaning that “hundreds of thousands, if not over a million” devices could be at risk of having their admin passwords stolen by hackers.
As Data Privacy Day is upon us, we thought it apt to put together some top tips on how to manage and secure your online information.
Tips on securing the Alexa service on Amazon Echo devices, notably voice purchasing, a topic brought into focus by the recent “San Diego dollhouse TV story”.
The US Federal Trade Commission has again acted on its serious concerns about data privacy and security in the Internet of Things (IoT). This time D-Link webcams and routers are the focus. Stephen Cobb puts this latest FTC move in context.
Malicious code could have been used to compromise an account, forward messages to an external account, or even spread a Yahoo Mail-infecting virus.
Users are warned to be on the look out for spam emails and reminded to never re-use passwords, as popular video-watching site suffers a data breach.
Need some more help choosing an inane conversation topic with your online friends? Don’t panic! Facebook appears keen to help you. But is its behaviour bordering on creepy?
Pippa Middleton is the latest in a long line of celebrities to have her online accounts broken into by criminals, and private photographs stolen.
Have you properly secured your iCloud account?
Video rules the internet today and webcams are built into practically every new laptop, smartphone and tablet. It’s important to keep them secure.
There are three key principles to be aware of when it comes to the EU-US Privacy Shield and we’ve digested all of the key points in this feature.
WeLiveSecurity delves deeper into VPN networks, asking how do they work? And what are the most common types of VPN that can be implemented?
A widespread hoax is being circulated between Facebook users, in the mistaken belief that posting the message will will give them more control over their privacy.
As Windows 10 nears its one year anniversary, WeLiveSecurity gives an in-depth review of the operating system from a security and privacy perspective.
Over 30 million Twitter account details are put up for sale on the computer underground.