Post-quantum iMessage: the next step in privacy protection
Apple has released a new encryption protocol – PQ3 – for iMessage, which provides post-quantum security for instant messaging.
117 articles
Apple has released a new encryption protocol – PQ3 – for iMessage, which provides post-quantum security for instant messaging.
Advertising firms boast that they can listen in on conversations through smart TVs and smartphones. Is this true, and, if so — how can you avoid being snooped on?
How unfortunate investors in commodities, cryptocurrency, and other assets get scammed in apps found in official stores.
A researcher has discovered a vulnerability in the Bluetooth protocol implementations for Android, macOS, iOS, and Linux, allowing devices to be hacked remotely.
Are Macs as safe as their owners think they are? A few recent stories about malware targeting macOS users.
The Nothing Chats app from Nothing Phone promised to be the iMessage for Android, but in less than 24 hours it was removed from Google Play due to a shocking lack of security.
Everything you wanted to know about Google account passkeys: how they work, why they’re needed, where to enable them, how to configure them, and what storage options are available.
How to choose a secure mobile platform for work.
We’ve found several scam investment-apps in the App Store that dupe users out of personal information.
Learn how geolocation services work, and who learns of your location when your smartphone pins it down.
Once again, very serious vulnerabilities have been found in Apple operating systems. Don’t delay updating to iOS 16.4.1 and macOS 13.3.1. Please note that updates are also available for iOS 15 and macOS 11 and 12.
You shouldn’t put off updating to iOS 16.3 and macOS Ventura 13.2 and future updates, and here’s why.
In late 2022, Apple announced a raft of new data protection features. Why does that matter to users?
Takeaway from DEF CON 30: vulnerability in Zoom for macOS.
Apple’s new feature promises enhanced protection in the fight against targeted attacks.
Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible.
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
In the past year, a slew of cases in which criminals used AirTags to stalk people have come to light. We explain how this works and how to protect yourself.
Dangerous vulnerability in WebKit (CVE-2022-22620) is believed to be actively exploited by hackers. Update your iOS devices as soon as possible!
How to set app permissions in iOS 15 for maximum privacy and security.