A well-known hacker claims to have 70 million user records stolen from AT&T, but the company denies a data breach.
T-Mobile's identity-theft-protection page for people affected by the company's massive data breach asks only for an email address and phone number, meaning anyone can try to sign up.
VPN Using a VPN is super simple nowadays, but there are still a few things that many users get wrong. Here are our top mistakes to avoid.
VPN International VPN Day might not be the celebration many of us asked for, but it's certainly one we need. Here's what it means to you.
Apple has quietly released a password manager for Windows, but it's not for anyone who doesn't often use a Mac or an iPhone.
NortonLifeLock plans to merge with Avast, and the combined company would have 25% of the market. Could it use its dominance to kill free antivirus software?
VPN Netflix has recently changed up its VPN blocking technique with devastating effect. Here, I test out our top services to see if they still work.
VPN OpenVPN has been around for two decades, and while almost every VPN supports it, is it still fit for purpose? Here, we run down OpenVPN pros and cons.
Facebook said end-to-end encryption was now an option for Messenger voice and video calls, and being tested for Messenger group chats and calls, Instagram DMs and calls.
Apple's new child safety tools include an on-device check to ensure photos don't contain abusive material. Here's how it works, and why it's already been criticized.
Home gateway routers often reveal their users' addresses on the internet, thanks to an unwise formatting decision made more than 20 years ago.
Each website you create an account with ends up wasting about 90 minutes of your time every year with emails, texts and phone calls, researchers have found.
Apple has confirmed that it will begin scanning user's photos against a child abuse database before uploading them to iCloud.
Zoom reached a tentative settlement in a class-action suit, agreeing to pay out $85 million over claims it skimped on user security and privacy.
A 'security update' is being applied to Google Drive files in September. Here's what's really happening, and what you need to do.
Letting browsers and password managers automatically fill in usernames and passwords on websites is a huge security risk, a Czech security researcher says.
It's not older women, but young men who think they know everything about computers are most likely to lose money in tech-support scams, reports Microsoft.
A widely used repository of open-source software has been infected with password-stealing malware, and there's no telling how many applications and projects have been poisoned.
Low-cost U.S. cellular carrier Mint Mobile appears to have suffered a data breach, which may have exposed an unknown number of user passwords.
Amazon's new Sidewalk home network has people worried about privacy and security, but is that really justified? And what about Apple's similar Find My network?
Nearly a dozen Android apps were set up to steal users' Facebook passwords and usernames, and were installed nearly 6 million times.
Personal data 'scraped' from 700 million LinkedIn user profiles is being sold online. Even though the data is theoretically public, it's useful for spammers, stalkers and phishers.
Brave Search, which promises to be a privacy-focused search engine that doesn't track or profile users, has entered public beta testing that anyone can try out.
Carnival, the world's largest cruise-ship operator, said it had been hit by its second data breach in the past 18 months.
CVS Health had more than a billion user-visit records exposed online, and some visitors accidentally added their own email addresses to the data.
Peloton has patched a flaw that could have let attackers seize complete control of an exercise bikes. Here's how to make sure your Peloton has the update.
Volkswagen of America said 3.3 million prospective and actual Audi customers had sensitive data exposed or stolen.
More than a terabyte of data stolen from 3.2 million PCs was found online, including 26 million usernames and passwords.
Apple reportedly paid a woman millions of dollars in a settlement after employees at a contracted facility for phone repairs leaked private photographs and a video online.
It’s possible to use an Android phone without Google, thanks to /e/OS. The software does a remarkable job at removing any Google influence on the otherwise open source operating system.