We explain what ultrasonic tracking is, how its works, and what it’s used for. We’ll also discuss the privacy and security implications involved.
Fradusters orchestrate scholarship scams to prey on unsuspecting students and steal their money and personal info. Find out how to outsmart them.
A CenturyLink data leak has been uncovered, involving the personal information of hundreds of thousands of its customers.
A growing number of websites now advertising a “free Netflix cookies” hack that allows Netflix access without signing up. Do they work? And are they legal?
From sending fake invoices to manipulating employees into wiring them money, hackers have a wide range of business email compromise techniques that they use to defraud companies.
Remote wiping can help to protect your data if a computer is lost or stolen. However, it is generally best to complement it with full disk encryption, because remote wiping has several limitations.
A new study shows most secondhand hard drives often contain private and sensitive information from their previous owners.
We examine the gender gap and the challenges faced by women in cybersecurity, and highlight some of the initiatives dedicated to helping them.
We’ll explore your main options for deleting all of your posts from some of the most popular social media sites (Facebook, Twitter, and Instagram).
Checksums are a simple means of making sure that data and software you download hasn’t been corrupted. We’ll show you how to validate checksums in Windows and Mac.