Google Location History is now stored offline… or maybe not
Google updates the Android Location History feature. Why the change, and how will this work in the future?
Economics. Eschatology. Infosec.
59 articles
Google updates the Android Location History feature. Why the change, and how will this work in the future?
Getting all the benefits of ChatGPT, Copilot, and Midjourney locally — without leaking your data to the internet.
AI tools can be seen everywhere — from operating systems and office suites to image editors and chats. How do you use ChatGPT, Gemini, and the many add-ons to these without jeopardizing your digital security?
Why cybercriminals want to attack PR and marketing staff and, crucially, how to protect your company from financial and reputational harm.
One-time codes and two-factor authentication securely protect you from account theft. If you receive such a code or a request to enter it when you aren’t logging in, it may be an attempt to hack into your account.
Advertising firms boast that they can listen in on conversations through smart TVs and smartphones. Is this true, and, if so — how can you avoid being snooped on?
Single sign-on is supposed to enhance corporate security, but it’s essential that cloud vendors have the information security team’s back.
Cybersecurity trends to consider and new threats to protect against in 2024.
Researchers used a hardware hack to bypass Windows Hello biometric authentication on three different devices. Can you trust this login method?
Unused apps not only clutter your phone but also create a risk of personal data leakage, so it’s better to remove them. But what if an app can’t be uninstalled? There’s a workaround.
Espionage operations to hack corporate routers are now commonplace — and all organizations need to be aware of this.
A look at the pros and cons of updating Android — and ways to do it safely.
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
Buying a cheap Android device can be an expensive mistake if it fails to perform its primary function or happens to be infected with viruses right out of the box.
Smiley passwords? Why ever not! The pros and cons of using emojis in passwords.
What personal information do modern cars collect about you, and how can you avoid surveillance or hacking of your vehicle?
You’ve interacted with scammers or visited a phishing site. What steps should you take to avoid being hacked?
We take a look at drivers: why we need them, the threats they pose, and how to keep your computer secure.
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.
What tasks needlessly overload infosec experts, and how to break the curse of overtime.
Comparing user-friendly, secure alternatives to Zoom, Teams and Google Meet calling.