Chinese laws, DOJ vs CA, and more – Weekly privacy news, August 14, 2020
Privacy News Online’s weekly video recap includes the top privacy stories, hosted by tech news commentator Brian Tong. Each...
Apple has patched its second zero-day security vulnerability of 2025 for iOS and iPadOS. Update now to protect your iPhone or iPad from a flaw that could allow a local attacker with physical access to break into your device.
Apple has added Android smartphone and tablet compatibility to its Apple TV app in the Google Play Store. Now Apple TV+ subscribers can stream on...
The new iPhone 16e is more expensive than the iPhone SE it replaces, but its rich feature set could make it the iPhone for...
Learn everything there is to know about how to manage your Apple Account (formerly known as Apple ID). You can adjust every setting via...
Intego’s malware research team has taken a closer look at OSX/Adload adware samples, and found that decompiled Python scripts seem to be undetected by most antivirus vendors.
Privacy News Online’s weekly video recap includes the top privacy stories, hosted by tech news commentator Brian Tong. Each...
Tor is supposed to protect your privacy. But nearly 24% of all Tor exit relays were owned by a...
A network-attached storage device, or NAS, is a great tool to have in your home or small office to...
Apple updated the 27" iMac this week, and it may be the last new desktop Mac running Intel processors,...
This week in privacy news: the FBI publicly accused China of creating Taidoor malware, T-Mobile shadow-banned customers for texting...
There are a number of ways you can send files securely to anyone over the internet.
We talk about an update on the Great Twitter Hack of 2020, discuss a ransomware attack on Garmin that...
This week in privacy news: new details have emerged about the Twitter hack, Garmin outages were caused by a...
We follow up on the great Twitter hack of 2020, we discuss how a Cloudflare outage brought down many...
On a recent weekend, I watched two movies, each of which used an element of computer security as a...