Join my exclusive Dead Drop Digest with the most popular spy stories, tips, & tricks.

close
Breaking news

A Russia-linked cyber-espionage group has hacked into the controls of electricit...read more What is metadata, how is it used and why is it important? When we interact over ...read more Mass surveillance is the subjection of a population or significant component of ...read more There’s a good chance you were affected by the Equifax hack of 143 million nam...read more Facebook has the ability to spy on users in their homes and offices because of...read more

How Game Apps That Captivate Kids Have Been Collecting Their Data

Before Kim Slingerland downloaded the Fun Kid Racing app for her then-5-year-old son, Shane, she checked to make sure it was in the family section of the Google Play store and rated as age-appropriate. The game, which lets children race cartoon cars with anima...

Fight Looms Over National Privacy Law

The tech industry and consumer groups are gearing up for a fight as lawmakers begin considering whether to draft a national privacy law. The push to get Congress to enact federal privacy standards is gaining new urgency after California passed what is seen as ...

Your customer data is being weaponized

Apple Chief Executive Tim Cook said on Wednesday customer data was being “weaponized with military...

Apple Gives You A TRUST Rating – And It’s Based On Your Phone Call And Email Habits

APPLE is now assigning trust ratings to iPhone users, based on your phone call and email habits. The...

As Facial-Recognition Technology Grows, So Does Wariness About Privacy. Use At a School in Seattle Fuels Debate.

RealNetworks is offering schools a new, free security tool: facial-recognition software. But as the ...

How to remove your private information from public sites

I’m not paid nor was I solicited, but when I come across a valuable resource I want to share. ...

Here’s How to Find Out How Much Data Apple Has About You

Recent scandals have revealed just how much data is being collected on us by various tech companies...

No boundaries: Exfiltration of personal data by session-replay scripts

You may know that most websites have third-party analytics scripts that record which pages you visit...

Virtual and Cyber Crime: Security Threats

Technology represents a new area of security threats. The danger of identity theft, cyber crime, and...

How to identify and protect against email Phishing

Phishing is when a 3rd party, typically a hacker or malicious website, uses the brand identity of a ...