Flaws in TP-Link's mobile app for its Kasa smart-home devices could let hackers spy on you and take over your accounts.
Credential stuffing is the best way to hack into accounts using reused passwords. Here's how to avoid becoming a victim.
As data breaches become more common, hackers are increasingly conducting credential-stuffing attacks -- and the U.S. is the biggest victim.
A pair of reports in Vice reveal controversial uses of location data gathered from smartphones. It's a reminder to check out the location settings on your own phone.
Googerteller is a free app that beeps when the sites and services you visit online send your data back to Google.
Privacy-minded search engine You.com is easy to use and looks great, but it's surprisingly intrusive, asking for personal information and insisting that you install a browser extension.
The ERMAC Android banking trojan has been upgraded with more features to make it easier to steal your credentials.
Avast researchers found 28 malicious Chrome and Edge browser extensions that could steal user data and install malware.
VPN Nexus is promising to improve security, privacy and connections. Will it be up to the challenge?
Google has removed 79 malicious browser extensions from the Chrome Web Store after they were caught spying on users.
VPN ExpressVPN's in-house protocol Lightway promises security and blazing speeds, and becoming open-source is a key milestone.
Apple has built privacy protections into its AirTag trackers, but they seem to apply only to people using fully updated iPhones.
Apple is making its devices even more secure with Lockdown Mode which will launch alongside iOS 16, iPadOS 16 and macOS Ventura.
The mobile-advertising industry uses location data to figure out where you are. Here's how to limit what's collected.
The Department of Homeland Security and other government agencies have been purchasing smartphone location data to keep tabs on American citizens.
The NCC Group has managed to bypass the Bluetooth proximity authentication mechanisms found in many popular devices.
At least 10 different women across the U.S. have reported being stalked by Apple AirTags since mid-December. Here's what to do if you think someone else's AirTag is tracking you.
Several incidents of Apple AirTags possibly being used to stalk women have shown up online lately. Here's what to do if you detect a rogue AirTag.
Downloading these popular child-tracking apps from the Play Store could put you and your child’s privacy and security at risk.
Deepfake technology is getting so good that it will become commonplace in phishing scams, an expert said at the Black Hat security conference.
Cybercrime will be run by intelligent robots by the year 2030, two expert said at the RSA Conference.
Downloading the app for your favorite restaurant may make ordering more convenient but it can also put your privacy and personal data at risk.
FCC Commissioner Brendan Carr posted a letter on Twitter requesting that Apple and Google pull ByteDance-owned Tik Tok from their respective app stores by July 8
Popular VPN provider proves privacy credentials for second year running – read how NordVPN has taken the initiative and undertaken a second privacy audit.
A security issue in Jacuzzi’s SmartTub software exposed the names and email addresses of smart hot tub owners online.
Germany’s national competition regulatory agency is taking a closer look at Apple’s App Tracking Transparency to determine whether its anti-competitive and self-serving.