Latest episode - listen now (or read if you prefer)...
Read moreLatest episode - listen now (or read if you prefer)...
Read moreTikTok “Invisible Challenge” porn malware puts us all at risk
November 30 2022An injury to one is an injury to all. Especially if the other people are part of your social network.
Read moreComputer Repair Technicians Are Stealing Your Data
November 28 2022Laptop technicians routinely violate the privacy of the people whose computers they repair:
Researchers at University of Guelph in Ontario, Canada, recovered logs from laptops after receiving overnight repairs...
Read more
Those numbers or names that pop up when a call comes up? They're OK as a hint of who's calling, but THEY PROVE NOTHING
Read moreThose numbers or names that pop up when a call comes up? They're OK as a hint of who's calling, but THEY PROVE NOTHING
Read moreApple’s Device Analytics Can Identify iCloud Users
November 22 2022Researchers claim that supposedly anonymous device analytics information can identify users:
On Twitter, security researchers Tommy Mysk and Talal Haj Bakry have found that Apple’s device analytics data...
Read more
How social media scammers buy time to steal your 2FA codes
November 22 2022The warning is hosted on a real Facebook page; the phishing uses HTTPS via a real Google server... but the content is all fake
Read moreHow social media scammers buy time to steal your 2FA codes
November 22 2022The warning is hosted on a real Facebook page; the phishing uses HTTPS via a real Google server... but the content is all fake
Read moreDon't let a keen eye for bargains lead you into risky online behaviour...
Read more
Recent Comments