How to set up security and privacy in adidas Running (Runtastic)
A detailed guide on setting up privacy in the adidas Running app.
78 articles
A detailed guide on setting up privacy in the adidas Running app.
A detailed guide to configuring privacy settings in the MapMyRun fitness tracker.
This guide will walk you through the essential privacy settings in the Nike Run Club training app.
The exact location of your router is publicly available through global Wi-Fi geolocation databases. Let’s explore why this is necessary, and the risks it entails and how to mitigate them.
Google has unveiled new privacy and security features coming to Android 15. We take a look at the innovations in the upcoming operating system update.
VoltSchemer attacks on wireless Qi chargers using modified power sources can “fry” smartphones and other devices, as well as issue commands to voice assistants.
A fresh study of some unexpected properties of a standard feature of all modern smartphones and tablets.
Android 13 and 14 have a feature called Restricted Settings. We explain its purpose, and how malicious applications bypass it.
The three most dangerous Android features that make your smartphone much more vulnerable to malware.
Android fingerprint protection isn’t that reliable after all: it can be brute-forced even without a copy of your fingerprint.
Learn how geolocation services work, and who learns of your location when your smartphone pins it down.
Could someone be viewing your private photos while your device is being repaired?
In a new study, security experts explore eavesdropping on phone conversations through a bug inside almost every smartphone. How dangerous is it?
In the past year, a slew of cases in which criminals used AirTags to stalk people have come to light. We explain how this works and how to protect yourself.
We explain what a smartphone’s ToF sensor is and how researchers from Singapore propose using it to find hidden cameras.
How to set app permissions in iOS 15 for maximum privacy and security.
A recent study shows that even “clean” Android smartphones collect a lot of information about their owners.
Create a digital comfort zone using any old tablets, laptops, and modems you have on hand to work from home safely.
You can refuse some permissions to greedy games, and they most definitely do not need these five.
Researchers found a way to create fake fingerprints to fool many devices, although it took a lot of effort.
Smartphones are always covered in bacteria, but viruses can also survive there, including COVID-19. We explain how to properly disinfect your smartphone.