Don’t believe your ears: voice deepfakes
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?
446 articles
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?
Smart feeders were invented to make life easier for pet owners; however, their vulnerabilities threaten not only owners’ privacy, but also the health of their pets.
Get all the benefits of a VPN — not just on your phone, but on your home computer, game console and smart TV too. The easiest way is to enable the VPN feature on your home router.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
Learn how geolocation services work, and who learns of your location when your smartphone pins it down.
Alternatives to Google Chrome that take data privacy more seriously.
What happens to your digital assets after you die, and how to make sure they fall into the right hands before you do.
Image-generating neural networks are already everywhere. What privacy risks do they pose?
How to set up modern VPN services to significantly speed up the connection and access new content securely.
Could someone be viewing your private photos while your device is being repaired?
Do you edit images in Windows 11 or on Google Pixel? Due to a developer error, hidden information in cropped or edited pictures can be recovered.
If you want your smart home to do more good than harm, you should configure it correctly and secure it adequately. We review smart-home security in detail.
What web beacons and tracker pixels are, what’s so obnoxious about them, and how to disable them.
Have you ever come across the words Secure DNS or Private DNS in your smartphone settings and security apps? It’s best to keep this feature enabled – it has many advantages.
New iPhone 14 wows with Emergency SOS feature for emergency calls via satellite. How does it work, and is it available on any other smartphone?
In a new study, security experts explore eavesdropping on phone conversations through a bug inside almost every smartphone. How dangerous is it?
We look at how secure password managers are against hacks, and how to protect your passwords as much as possible.
Here are a few tips on how to make your Untappd profile as private and secure as possible.
In late 2022, Apple announced a raft of new data protection features. Why does that matter to users?
Received an attractive job offer from a stranger? Be careful! It could be a scam…
A few words about why Telegram isn’t as secure as its developers boast.