Microsoft’s new Security Store is like an app store for cybersecurity

Microsoft’s new Security Store is like an app store for cybersecurity
Microsoft is launching a Security Store that will be full of security software-as-a-service (SaaS) solutions and AI agents. It’s part ...
Read more

Tile’s lack of encryption could make tracker owners vulnerable to stalking

Tile’s lack of encryption could make tracker owners vulnerable to stalking
Life360 takes the privacy and safety of our members and products very seriously. It’s why we participate in the HackerOne ...
Read more

Proton Pass Review (2025): Finally Standing Tall

Proton Pass Review (2025): Finally Standing Tall
You can rename your vaults, but you can also assign them one of a few dozen icons, as well as ...
Read more

An App Used to Dox Charlie Kirk Critics Doxed Its Own Users Instead

An App Used to Dox Charlie Kirk Critics Doxed Its Own Users Instead
New research released this week shows that over the past few years the US Department of Homeland Security has collected ...
Read more

Secret Service dismantles network capable of shutting down cell service in New York

Secret Service dismantles network capable of shutting down cell service in New York
The US Secret Service says it has disrupted a network of devices used to carry out assassination threats against US ...
Read more

1Password Review (2025): Gold Standard Security

1Password Review (2025): Gold Standard Security
Password managers are spotty on Android and iOS in general, and 1Password isn’t above that issue. I’d estimate somewhere around ...
Read more

A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster

A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster
Almost immediately after the cyberattack, a group on Telegram called Scattered Lapsus$ Hunters, claimed responsibility for the hack. The group ...
Read more

This Microsoft Entra ID Vulnerability Could Have Been Catastrophic

This Microsoft Entra ID Vulnerability Could Have Been Catastrophic
As businesses around the world have shifted their digital infrastructure over the last decade from self-hosted servers to the cloud, ...
Read more

How to Set Up and Use a Burner Phone

How to Set Up and Use a Burner Phone
When you are done with the burner phone, make sure that you get rid of it in a thoughtful way ...
Read more

A DHS Data Hub Exposed Sensitive Intel to Thousands of Unauthorized Users

A DHS Data Hub Exposed Sensitive Intel to Thousands of Unauthorized Users
The Department of Homeland Security’s mandate to carry out domestic surveillance has been a concern for privacy advocates since the ...
Read more