#mobile-device-safety

[ follow ]
#android
Privacy technologies
fromZDNET
10 hours ago

How to easily encrypt files on an Android phone - and the free app I use to do it

Encrypting files on Android is straightforward with the OpenKeyChain app, which uses public key encryption for secure file sharing.
Privacy technologies
fromZDNET
10 hours ago

How to easily encrypt files on an Android phone - and the free app I use to do it

Encrypting files on Android is straightforward with the OpenKeyChain app, which uses public key encryption for secure file sharing.
#cybersecurity
Information security
fromThe Hacker News
15 hours ago

Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More

Third-party tools are exploited to gain internal access, highlighting a shift in attack strategies that bend trust rather than break systems.
fromThe Hacker News
6 days ago
Information security

108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users

A cluster of 108 malicious Chrome extensions collects user data and injects ads, compromising browser security.
fromTechCrunch
3 weeks ago
Information security

A major hacking tool has leaked online, putting millions of iPhones at risk. Here's what you need to know | TechCrunch

Cyberattacks targeting Apple customers have emerged, utilizing hacking tools Coruna and DarkSword to steal data from iPhones and iPads.
Information security
fromTechRepublic
12 hours ago

2026's Breach List So Far: FBI Hacked, 1B Androids at Risk, 270M iPhones Vulnerable

2026 has seen significant cyber threats, including a major FBI hack and the discovery of the DarkSword iPhone exploit framework.
Information security
fromThe Hacker News
15 hours ago

Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More

Third-party tools are exploited to gain internal access, highlighting a shift in attack strategies that bend trust rather than break systems.
Information security
fromSecurityWeek
21 hours ago

Hackers Fail to Exploit Flaw in Discontinued TP-Link Routers

Hackers have targeted a vulnerability in discontinued TP-Link routers for a year without successful exploitation, according to Palo Alto Networks.
Information security
fromThe Hacker News
6 days ago

108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users

A cluster of 108 malicious Chrome extensions collects user data and injects ads, compromising browser security.
Information security
fromTechCrunch
3 weeks ago

A major hacking tool has leaked online, putting millions of iPhones at risk. Here's what you need to know | TechCrunch

Cyberattacks targeting Apple customers have emerged, utilizing hacking tools Coruna and DarkSword to steal data from iPhones and iPads.
#data-privacy
Privacy professionals
fromZDNET
16 hours ago

I tried to wipe my digital footprint without paying for a data removal service - 5 free ways

Most sensitive information online is legally collected and aggregated by brokers, but removal is possible with effort and available tools.
EU data protection
fromThedrum
12 hours ago

The future of data, privacy and ethics

Misleading practices in e-commerce, such as false stock availability, are regulated by the European Commission to protect consumers.
fromZDNET
6 days ago
Privacy professionals

A data removal service helped me reclaim my privacy - see if you need one, too

Privacy professionals
fromZDNET
16 hours ago

I tried to wipe my digital footprint without paying for a data removal service - 5 free ways

Most sensitive information online is legally collected and aggregated by brokers, but removal is possible with effort and available tools.
EU data protection
fromThedrum
12 hours ago

The future of data, privacy and ethics

Misleading practices in e-commerce, such as false stock availability, are regulated by the European Commission to protect consumers.
Privacy professionals
fromZDNET
6 days ago

A data removal service helped me reclaim my privacy - see if you need one, too

Personal data is collected and sold by brokers, making removal services essential for protecting sensitive information.
Mobile UX
fromGSMArena.com
49 minutes ago

WhatsApp is now testing its subscription service, here's what you get and how much it costs

WhatsApp is testing a subscription service called WhatsApp Plus, offering premium features for a monthly fee.
Mental health
fromSmashing Magazine
1 day ago

Session Timeouts: The Overlooked Accessibility Barrier In Authentication Design - Smashing Magazine

Poor session timeouts create significant accessibility barriers for users with disabilities, impacting their online experiences and tasks.
fromwww.npr.org
20 hours ago

Got wearable data? Your doctor can help you connect the dots

"I felt like there were these patterns that were really related to my symptoms, but I didn't know how to connect them."
US news
fromThe New Yorker
19 hours ago

When Your Digital Life Vanishes

A broken phone or corrupted drive can mean the loss of work, evidence, art, or the last traces of the dead. But sometimes data-recovery experts can summon lost files from the void.
Digital life
Wearables
fromZDNET
13 hours ago

There's a right way to wear your Apple Watch - and it affects your data

Wearing a smartwatch tightly improves the accuracy of health data capture, particularly for heart rate monitoring.
#samsung
Gadgets
fromFast Company
23 hours ago

Samsung shares its thesis on the future of design and AI (exclusive)

Samsung showcases Project Luna and a vision for future design at Milan Design Week, emphasizing communal AI and a new design language.
Gadgets
fromFast Company
23 hours ago

Samsung shares its thesis on the future of design and AI (exclusive)

Samsung showcases Project Luna and a vision for future design at Milan Design Week, emphasizing communal AI and a new design language.
#smart-tvs
Television
fromMen's Journal
1 day ago

Your Smart TV May Be Taking Screenshots Every 15 Seconds

Smart TVs capture and transmit on-screen data frequently, raising significant privacy concerns for users.
Privacy technologies
fromMiami Herald
1 day ago

Your Smart TV May Be Taking Screenshots Every 15 Seconds

Smart TVs capture screen data frequently, raising privacy concerns as manufacturers prioritize data collection over user awareness.
Television
fromMen's Journal
1 day ago

Your Smart TV May Be Taking Screenshots Every 15 Seconds

Smart TVs capture and transmit on-screen data frequently, raising significant privacy concerns for users.
Privacy technologies
fromMiami Herald
1 day ago

Your Smart TV May Be Taking Screenshots Every 15 Seconds

Smart TVs capture screen data frequently, raising privacy concerns as manufacturers prioritize data collection over user awareness.
fromTheregister
3 days ago

Apple is working on passcode bug locking out iPhone users

The only issue was that he used the caron/háček (ˇ) on the iPhone's Czech keyboard as one of his special characters - a character Apple removed in iOS 26, which became generally available to iDevices in September 2025.
Apple
Marketing tech
fromSFGATE
4 days ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech giants like Google to enhance their defenses against these threats.
fromNature
1 week ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
#android-security
Information security
fromTechRepublic
11 hours ago

Over 800 Android Apps Targeted in PIN-Stealing Trojan Campaign

Hackers exploit Android's overlay feature to capture PINs and monitor user interactions across over 800 apps using banking trojans.
Privacy technologies
fromComputerworld
1 month ago

3 Android theft protection additions you should absolutely activate

Android devices have built-in security layers and permission systems that prevent unauthorized app access to sensitive data without explicit user approval.
Information security
fromTechRepublic
11 hours ago

Over 800 Android Apps Targeted in PIN-Stealing Trojan Campaign

Hackers exploit Android's overlay feature to capture PINs and monitor user interactions across over 800 apps using banking trojans.
Privacy technologies
fromComputerworld
1 month ago

3 Android theft protection additions you should absolutely activate

Android devices have built-in security layers and permission systems that prevent unauthorized app access to sensitive data without explicit user approval.
#data-breach
Privacy professionals
fromTechRepublic
10 hours ago

Amtrak Data Breach Exposes 2.1M Records, Reports Suggest Larger Leak

Amtrak customers face data exposure due to a breach affecting millions of records, including personal and travel-related information.
Privacy professionals
fromTheregister
6 hours ago

Lovable denies data leak, cites 'intentional behavior'

Lovable's platform has a significant security flaw allowing free accounts to access sensitive user information, raising concerns about data protection.
Privacy professionals
fromTechRepublic
10 hours ago

Amtrak Data Breach Exposes 2.1M Records, Reports Suggest Larger Leak

Amtrak customers face data exposure due to a breach affecting millions of records, including personal and travel-related information.
Digital life
fromPsychology Today
8 hours ago

A Slight Reduction in Phone Use Can Have Surprising Effects

Constant smartphone use negatively impacts attention and mental health, but short breaks can lead to significant improvements in just two weeks.
Mobile UX
fromEngadget
7 hours ago

Google brings Gemini in Chrome to users in Australia, Japan, Singapore and South Korea

Gemini in Chrome is expanding to East Asia and the Pacific, allowing users to access the built-in chatbot across multiple devices.
fromThe Washington Post
2 days ago

Inside a growing movement warning AI could turn on humanity

"That requires a bunch of people to go take things that folks here are figuring out and [explain them] to the rest of the world," said Jeffrey Ladish, emphasizing the need for effective communication about AI risks.
US news
Artificial intelligence
fromTechRepublic
3 days ago

AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech - TechRepublic

AI innovation and security threats are reshaping technology and corporate strategies across various platforms and applications.
#age-verification
EU data protection
fromWIRED
4 days ago

Europe's Online Age Verification App Is Here

The European online age verification app ensures anonymous age verification using ID cards or passports, protecting children from harmful content.
Privacy technologies
fromThe Verge
4 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
EU data protection
fromWIRED
4 days ago

Europe's Online Age Verification App Is Here

The European online age verification app ensures anonymous age verification using ID cards or passports, protecting children from harmful content.
Privacy technologies
fromThe Verge
4 days ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
#privacy
Privacy technologies
fromTechRepublic
11 hours ago

Chrome Privacy Concerns Rise as Expert Warns of Fingerprinting Risks

Browser fingerprinting poses significant privacy risks in Chrome, with at least thirty techniques currently in use to track users without consent.
fromComputerWeekly.com
3 days ago
Privacy technologies

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
fromElectronic Frontier Foundation
4 days ago
Privacy technologies

How Push Notifications Can Betray Your Privacy (and What to Do About It)

Push notifications can reveal personal information, and both Apple and Google have restrictions on sharing this data with law enforcement.
Privacy technologies
fromTechRepublic
11 hours ago

Chrome Privacy Concerns Rise as Expert Warns of Fingerprinting Risks

Browser fingerprinting poses significant privacy risks in Chrome, with at least thirty techniques currently in use to track users without consent.
Privacy technologies
fromTheregister
9 hours ago

Claude Desktop changes software permissions without consent

Claude Desktop installs files affecting other apps without consent, violating privacy laws and raising concerns about its classification as spyware.
Privacy technologies
fromComputerWeekly.com
3 days ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Digital life
fromwww.dw.com
6 days ago

Dangerous Apps In the Web of Data Brokers

Smartphone apps collect detailed location data, often shared with data brokers, posing security risks to users, including soldiers and government officials.
fromSecurityWeek
20 hours ago

Half of the 6 Million Internet-Facing FTP Servers Lack Encryption

Approximately 6 million internet-accessible systems are using FTP today, and almost half of them do not use encryption, exposing enterprises and end users to avoidable risks.
Privacy professionals
Privacy technologies
fromMail Online
4 days ago

Is YOUR phone safe? Facial recognition on 21 devices can be spoofed

Facial recognition on many mobile phones can be easily fooled by printed photos, posing security risks for users.
Wearables
fromMakeUseOf
2 weeks ago

Your phone's Bluetooth is broadcasting more than you think - here's how to limit it

Bluetooth remains active and broadcasts data even when not connected, potentially allowing for tracking without user consent.
Privacy professionals
fromHoodline
16 hours ago

Brooklyn ShopRite's Biometric Notice Raises Shopper Concern

ShopRite may collect biometric data, raising privacy concerns among shoppers about surveillance and data handling practices.
#vercel
Information security
fromTechCrunch
14 hours ago

App host Vercel confirms security incident, says customer data was stolen via breach at Context AI | TechCrunch

Vercel experienced a data breach due to a compromised employee account linked to Context AI, exposing customer credentials.
Information security
fromTechCrunch
14 hours ago

App host Vercel confirms security incident, says customer data was stolen via breach at Context AI | TechCrunch

Vercel experienced a data breach due to a compromised employee account linked to Context AI, exposing customer credentials.
Information security
fromSecuritymagazine
1 day ago

58% of Organizations Spend Over 10 Hours a Month Securing AI-generated Code

31% of organizations using AI-generated code spend 10 hours or less per month on validation and auditing, raising security concerns.
Privacy professionals
fromGSMArena.com
2 days ago

India drops proposal to make smartphone brands pre-install unique ID app Aadhaar on their devices

The Indian government has rejected a proposal to mandate pre-installation of the Aadhaar app on smartphones due to security and cost concerns.
Privacy professionals
fromFast Company
2 days ago

How to hide your sensitive info (for real) when using ChatGPT and other AI chatbots

Chatbots can be useful for summarizing complex information, but sensitive data must be properly redacted to ensure privacy.
Privacy technologies
fromwww.bbc.com
3 days ago

Tinder and Zoom offer 'proof of humanity' eye-scans to combat AI

Tinder will implement eye-scanning technology to verify users as human, addressing concerns over AI-generated fake profiles.
#identity-verification
Information security
fromSecurityWeek
2 days ago

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

Threat actors have shifted to new phishing platforms after Tycoon 2FA's disruption, reusing its tools and increasing overall phishing attacks.
Privacy professionals
fromFast Company
1 week ago

This iPhone trick lets you use ChatGPT without the privacy risks

Using AI chatbots poses risks to privacy and data security, but Siri can help mask identity when accessing ChatGPT on iPhones.
Privacy technologies
from404 Media
4 days ago

App Stores Push Users Toward Nudify Apps, New Research Shows

Google and Apple's app stores actively promote harmful nudify and undress apps, contrary to their stated policies.
Information security
fromBusiness Matters
4 days ago

Why Trust and Verification Are Critical for Modern Online Platform Businesses

Trust is essential yet fragile in the digital economy, with platforms facing increasing challenges from sophisticated online scams.
Privacy technologies
fromEngadget
4 days ago

Apple and Google are reportedly pointing users to nudify apps

Apple and Google continue to promote nudify apps despite policies against such content, raising concerns about their enforcement and user safety.
#whatsapp
Privacy technologies
fromTechRepublic
5 days ago

WhatsApp New Update Lets You Chat Without Sharing Your Phone Number

WhatsApp is introducing usernames, allowing users to chat without sharing phone numbers, enhancing privacy and user experience.
Privacy professionals
fromTechCrunch
2 weeks ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
Privacy technologies
fromTechRepublic
5 days ago

WhatsApp New Update Lets You Chat Without Sharing Your Phone Number

WhatsApp is introducing usernames, allowing users to chat without sharing phone numbers, enhancing privacy and user experience.
Privacy professionals
fromTechCrunch
2 weeks ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
Information security
fromTechRepublic
3 days ago

New Phishing Attack Turns n8n Into On-Demand Malware Machine

Attackers are exploiting n8n workflows to deliver malware while evading detection and blending into normal business activities.
Information security
fromComputerWeekly.com
4 days ago

Cyber Essentials closes the MFA loophole but leaves some organisations adrift | Computer Weekly

Multi-factor authentication becomes mandatory under Cyber Essentials v3.3, with no exceptions for organizations failing to implement it.
Information security
fromSecurityWeek
5 days ago

Mirax RAT Targeting Android Users in Europe

A new remote access trojan named Mirax targets Android users in Europe, enabling extensive control and data theft through sophisticated techniques.
Information security
fromThe Hacker News
1 week ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Privacy technologies
fromZDNET
3 weeks ago

5 telltale signs that your phone has been compromised (and how to combat them)

Phone hacking can be detected through signs like battery drain, slow performance, unfamiliar logins, and reduced storage space.
Information security
fromWIRED
1 month ago

Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild

A sophisticated iPhone hacking technique called DarkSword enables attackers to silently compromise iOS devices through infected websites, affecting hundreds of millions of users running older iOS versions.
Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
fromZDNET
2 months ago

Is spyware hiding on your phone? How to find out and remove it - fast

Spyware is one of the top threats to your mobile security and can severely impact your handset's performance if you are unlucky enough to become infected. It is a type of malware that typically lands on your iPhone or Android phone through malicious mobile apps or through phishing links, emails, and messages. While appearing to be a legitimate software package or useful utility, spyware will operate quietly in the background to monitor your movements,
Privacy technologies
fromTech Advisor
2 months ago

Your phone is covertly sharing your data at night! How to stop it

The data that a smartphone transmits in a continuous loop can be divided into two categories: legitimate data that maintains the functionality of the device, and sensitive data that is used for tracking, advertising and other purposes. It is not always clear which data falls into which category. For example, if your device sends diagnostic data and reports to the manufacturer or app developers, this may be necessary and important. However, it usually also requires your consent.
Privacy technologies
fromZDNET
1 month ago

Phone acting weird? 5 red flags that could point to hackers

Your mobile phone is a treasure trove of personal and confidential information. That's why it's a prime target for hackers who want to compromise or steal your data. Through malicious apps and websites, phishing attacks, and other threats, an attacker can gain control of your device through spyware. But how can you tell if your phone has been hacked or tapped?
Information security
Privacy technologies
fromFast Company
1 month ago

Why using facial recognition on your phone could leave you vulnerable

Biometric phone unlocking is convenient but can be compelled by authorities or exploited by others, making passcodes a safer option.
fromFast Company
1 month ago

Scanning that QR code can leave you vulnerable. Here's how to protect yourself

QR codes are two-dimensional images with glyphs of various sizes that store not just numbers, but text. When scanned, your phone extracts the encoded information and can act on it. For example, QR codes often embed URLs, allowing you to scan, say, a parking meter to launch a webpage where you can pay online.
Privacy technologies
#password-security
fromFast Company
2 months ago
Information security

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

fromFast Company
2 months ago
Information security

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

fromSlashGear
2 months ago

Changing 5 Phone Settings Can Limit The Amount Of Data Apps Collect About You - SlashGear

Only about a year old at that point, the App Store was changing people's relationship with software. Users were growing accustomed to the idea that the smartphone was a digital Swiss Army Knife, its glossy touchscreen waiting to be fitted with the right tool for any job. But what the public had not anticipated as we swiped and scrolled was that our phones might begin to watch us back.
Privacy technologies
Information security
fromTechCrunch
2 months ago

Android phones are getting more anti-theft features | TechCrunch

Android expands theft-protection: toggle for Failed Authentication Lock, longer lockouts, Identity Check covers all biometric apps, optional Remote Lock challenge, defaults enabled in Brazil.
Privacy technologies
fromFast Company
2 months ago

This new privacy-focused phone service is designed to keep your phone from getting hacked

Cape is a US-wide privacy-focused cellphone carrier that prevents SIM swapping and IMSI-catcher surveillance while minimizing customer data collection and encrypting voicemails.
Information security
fromGSMArena.com
2 months ago

Google expands Android theft protection features

Android 16 expands theft protection with granular Failed Authentication Lock toggles, broader biometric coverage, longer lockouts, enhanced recovery tools, and default Remote Lock in Brazil.
fromWIRED
1 month ago

Password Managers Share a Hidden Weakness

An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
Information security
[ Load more ]