A report calls into question the providers’ security practices and dismisses their claims of being no-log VPN services
In a move lauded by privacy advocates, Boston joins the ranks of cities that have voted down the municipal use of the technology
Cyberbullying can happen to anyone, at any time – and at any age. How can adults deal with various forms of online abuse and harassment?
Here’s how encryption can help keep your data safe from prying eyes – even if your device is stolen or your cloud account is hacked
…and why are they selling it to other security vendors and product testers?
While in France, a citizen of Brazil who resides in California books a bungee jump in New Zealand. Is it a leap of faith into the unknown, for both the operator and the thrill-seeker?
The warning highlights one of the potential risks associated with revealing too much private information online
By contrast, two other web browsers share identifiers that are tied to the device hardware and so persist even across fresh installs
People in other parts of the world also have the option to flip on DNS encryption
Do social media listen in on our conversations in order to target us with ads? Or are we just a bit paranoid? A little test might speak a thousand words.
Other leaked records include videos, facial and body scans, as well as a range of patients' personal data
As Facebook turns 16, we look at how to keep your personal information safe from prying eyes
Have you had a Google Privacy Checkup lately? If not, when better than Data Privacy Day to audit the privacy of your Google account?
The browser's anti-tracking feature could apparently give access to users’ browsing habits
Some of the most popular dating services may be violating GDPR or other privacy laws
Are you looking to hide in plain sight? Here’s a rundown of three options for becoming invisible online
The company will also soon launch anti-fingerprinting measures aimed at detecting and mitigating covert tracking and workarounds
A Xiaomi security camera owner reports receiving random images from strangers’ homes
A variety of sensitive information has been there for the taking due to an unsecured cloud storage container
What issues would face scanning attached to a mobile device resolve and, if used correctly, would it make the incursion into my privacy acceptable?