How to Organize Safely in the Age of Surveillance

For all these approaches, from the fully public to the paranoid, the same principle applies as in a Signal conversation: A piece of information is only as secure as the least secured device that accesses it. So as you consider your threat model and whose devices and accounts within your group have access to your […]
Artificial intelligence is fueling romance scams. Here’s how

Online dating can be challenging enough, but scammers are using artificial intelligence to sound more charming and believable. Americans lost more than $672 million from romance scams in 2024, according to a report by the Federal Bureau of Investigation. A.I. has only made these scams more widespread. One in four Americans say they’ve encountered a […]
How to protect personal information, as data breaches hit a new high

Fertnig | E+ | Getty Images It’s the letter most consumers dread receiving — the notification that your personal information has been involved in a data breach. About 80% of respondents to a new survey said they received at least one data breach notice in the prior 12 months, according to the Identity Theft Resource […]
How to Protect Your iPhone or Android Device From Spyware

Infection usually starts through malicious links and fake apps, but it is also taking place via “more subtle methods,” says Richard LaTulip, a field CISO at security company Recorded Future, which collaborated with Google’s threat intelligence team on the Predator spyware findings. LaTulip cites the example of recent research on malicious browser extensions affecting millions […]
What Is a Passkey? Here’s How to Set Up and Use Them (2025)

With a password, there’s a ton of room for an attacker to potentially steal your password. Data breaches might expose your password, and even if it’s encrypted, it can be cracked. Phishing schemes are an easy vector of attack for hackers looking to steal passwords. And, if you’re using a service with spotty security practices, […]
A Researcher Figured Out How to Reveal Any Phone Number Linked to a Google Account

A cybersecurity researcher was able to figure out the phone number linked to any Google account, information that is usually not public and is often sensitive, according to the researcher, Google, and 404 Media’s own tests. The issue has since been fixed but at the time presented a privacy issue in which even hackers with […]
How to Win Followers and Scamfluence People

As soon as Format Boy answers the phone, I recognize his booming voice. I’ve spent weeks immersed in the influencer’s back catalog of videos and voice notes. Format Boy isn’t like other influencers: He doesn’t show his face, and he won’t tell me his real name. He isn’t posting motivational content or seeking lucrative brand […]
Google Calendar Malware Is on the Rise. Here’s How To Stay Safe

While software makers and app developers continue to make their wares safer and less open to attack, you can never get complacent with digital security—and you need to be aware of all the different methods of attack that bad actors use to get at your accounts. Those methods include targeting Google Calendar: An app so […]
Here’s how to tell if your phone is listening to you — and how to stop it

Listen up. Experts from NordVPN have outlined a four-step process that anyone can follow to find out whether their phone is listening in and using private discussions for targeted advertising, Daily Mail reported. Some smartphone users worry that their device is listening to them speak when they least suspect it. wachiwit – stock.adobe.com The first […]
The cyber safety video game teaching students how to stay safe online amid a rise in deepfake scams

In this Sydney classroom, year 5 students are playing a video game. With headsets on, they watch their screens intently. It isn’t the typical lesson taught in a primary school, but this game is different. Using real-life scams, the students are being shown how to spot online fraud. Students at Mosman Public School playing a […]