Immunity passports may seem like a natural fit at this time, but we have a duty to ensure that the underlying technology does not undermine our privacy rights and individual freedoms.
Fraudsters often use emails, texts, phone calls, and pretexting scenarios to extract sensitive information. We reveal everything you need to know about pretexting attacks including examples and how to defend yourself.
One of the key questions to ponder when using Google Drive cloud storage is: are my files secure and private? We take a closer look at Google Drive security, and offer steps you can take to improve it.
Hacking incidents are on the rise. Most go undetected long before the victim realizes what happened. Here are 10 clear signs you can use to tell if your phone or computer has been hacked.
Health officials in Argentina exposed a database on the web containing personal information from people who applied for COVID-19 circulation permits, which exempt recipients from quarantine restrictions.
Done with Twitter and want to get rid of your account as quickly as possible? We reveal how to quickly delete your Twitter profile and ensure your data is permanently wiped.
Advanced persistent threats (APTs) are the most complex cyberattacks. They are generally mounted by groups linked to nation-states and target highly valuable systems and data. We explain what APTs are and how to defend against them.
Ever wondered who is more likely to be targeted by online scammers? We reveal some surprising internet safety statistics as well as easy to follow advice to protect yourself from online scams.