Privacy


413 articles

The OSINT advantage: Find your weak spots before attackers do

The OSINT advantage: Find your weak spots before attackers do

The OSINT advantage: Find your weak spots before attackers do

Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots

Mario Micucci20 Nov 2025


What if your romantic AI chatbot can’t keep a secret?

What if your romantic AI chatbot can’t keep a secret?

What if your romantic AI chatbot can’t keep a secret?

Does your chatbot know too much? Here's why you should think twice before you tell your AI companion everything.

Phil Muncaster17 Nov 2025


How Uber seems to know where you are – even with restricted location permissions

How Uber seems to know where you are – even with restricted location permissions

How Uber seems to know where you are – even with restricted location permissions

Is the ride-hailing app secretly tracking you? Not really, but this iOS feature may make it feel that way.

Tony Anscombe09 Oct 2025


Why the tech industry needs to stand firm on preserving end-to-end encryption

Why the tech industry needs to stand firm on preserving end-to-end encryption

Why the tech industry needs to stand firm on preserving end-to-end encryption

Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity

Tony Anscombe01 Aug 2025


Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

Our ‘computers on wheels’ are more connected than ever, but the features that enhance our convenience often come with privacy risks in tow

Tony Anscombe13 Dec 2024


The great location leak: Privacy risks in dating apps

The great location leak: Privacy risks in dating apps

The great location leak: Privacy risks in dating apps

What if your favorite dating, social media or gaming app revealed your exact coordinates to someone you’d rather keep at a distance?

Tony Anscombe12 Aug 2024


Buying a VPN? Here’s what to know and look for

Buying a VPN? Here’s what to know and look for

Buying a VPN? Here’s what to know and look for

VPNs are not all created equal – make sure to choose the right provider that will help keep your data safe from prying eyes

Phil Muncaster25 Jun 2024


7 reasons why cybercriminals want your personal data

7 reasons why cybercriminals want your personal data

7 reasons why cybercriminals want your personal data

Here's what drives cybercriminals to relentlessly target the personal information of other people – and why you need to guard your data like your life depends on it

Tomáš Foltýn08 Apr 2024


A prescription for privacy protection: Exercise caution when using a mobile health app

A prescription for privacy protection: Exercise caution when using a mobile health app

A prescription for privacy protection: Exercise caution when using a mobile health app

Given the unhealthy data-collection habits of some mHealth apps, you’re well advised to tread carefully when choosing with whom you share some of your most sensitive data

Phil Muncaster19 Mar 2024