Fake video conferencing apps are targeting Web3 workers to steal their data By Sead Fadilpašić published 9 December 24 Crooks are trying to deploy infostealers, and steal cryptocurrency, using fake job ads.
NymVPN boosts its censorship-unlocking power with new features By Rene Millman published 7 November 25 The Latest release from privacy-focused NymVPN introduces QUIC protocol support and a new 'Stealth API' to help users bypass aggressive internet blocks and surveillance.
VPNs cannot protect against browser fingerprinting – but this new web browser could be the fix By Chiara Castro published 21 June 25 Developed by two privacy researchers, Psylo introduces a one-of-a-kind isolated tab system powered by a proxy network.
Wonder what happens to your encrypted data in case of an emergency? Proton now lets you plan ahead By Chiara Castro published 28 August 25 Emergency Access works across Proton VPN, Proton Mail, Proton Pass, and Proton Drive, letting you choose up to 5 trusted contacts.
Hackers can now inject AI deepfakes directly into iOS video calls using this tool - here's how to stay safe By Efosa Udinmwen published 22 September 25 Hackers exploit specialized tool to inject AI deepfakes into iOS calls, bypassing cameras and challenging current identity verification systems.
Salt Typhoon: US cybersecurity watchdog urges switch to Signal-like messaging apps By Chiara Castro published 19 December 24 Using only end-to-end encrypted apps is CISA's main security tip to secure your mobile communication in the wake of the biggest telecom attack in US history.
What is Model Context Protocol (MCP) and why is it crucial for AI development? By Yuval Fernbach published 8 October 25 As AI development accelerates, organizations are under increasing pressure to move models from prototype to production securely and with scalability.
A glimpse into the next decade of connectivity: 4 lessons from Yotta 2025 By Ivo Ivanov published 21 November 25 Trust in the public Internet is collapsing—private networks and satellites are replacing it now.
Microsoft Teams and Zoom can be hijacked to give hackers the keys to your kingdom By Craig Hale published 7 August 25 Cybercriminals can hide their malicious traffic within Microsoft Teams and Zoom, and it's not even due to a vulnerability.
I get annoying spam calls all the time, so I can’t wait for the Call Screening feature in iOS 26 By Jamie Richards published 12 June 25 Scam calls are so common that some days I don’t pick up the phone – iOS 26 promises to make it easier to deal with them
Best CPaaS (Communications Platform as a Service) provider of 2026 By Stefan Ionescu last updated 23 September 24 We feature the best CPaaS (Communications Platform as a Service) providers, to make it simple and easy to set up and manage integrated communications for your business.
Proton Pass just made it even easier for developers to retrieve secrets — and that's a win for everyone involved By Benedict Collins published 10 December 25 A command-line interface is just what users wanted, and now Proton Pass have added it.
Bluesky just made it harder for someone to steal your name, but verification is still a challenge By Lance Ulanoff published 20 December 24 Bluesky makes an important update to its somewhat basic verification system
“It's the same doors that the good guys use, that the bad guys can walk through” - former White House tech advisor on data-centric security in the wake of Salt Typhoon By Benedict Collins published 18 January 25 Former White House tech advisor John Ackerly believes Salt Typhoon attacks were a matter of when, not if, after the US baked backdoors into networks in pursuit of security.
“A first step in Europe” – Proton slams Switzerland's new surveillance bill at the United Nations Forum By Chiara Castro published 22 October 25 An amendment to the Swiss surveillance law could soon force VPNs and messaging apps to identify and retain user data.
Is Proton leaving Switzerland? "Legal uncertainty" of proposed surveillance laws is pushing them to make several changes By Chiara Castro published 14 August 25 An amendment to the Swiss surveillance law would require VPNs and messaging apps to identify and retain user data – requirements that could threaten Proton's privacy-first business model.
Cyber resilience in the post-quantum era: the time of crypto-agility By Tim Zonca published 25 August 25 Post-quantum cryptography will protect organizations in the post-quantum era - here's how.
Why AI needs zkML: the missing puzzle piece to AI accountability By Tiancheng Xie published 25 April 25 A new approach to contemporary AI accountability challenges.
Russian bulletproof hosting system targeted by hackers to spread malware By Sead Fadilpašić published 21 April 25 Cybercriminals are using Proton66 for a range of activities, researchers say.
Proton launches new end-to-end encrypted spreadhseets for ultra secure data handling By Craig Hale published 4 December 25 Proton Drive now has Docs and Sheets to ensure maximum data security across key workflows.
Samsung pulls curtains on classified operation called Project Infinity, where teams compete relentlessly to improve security on billions of Galaxy phones By Efosa Udinmwen published 26 December 24 Samsung's Project Infinity, featuring Red, Blue, Purple teams, and the CTI taskforce, protects Galaxy users from cyber threats.
The end of ‘dead zones’? Starlink’s direct-to-cell satellite service passes big milestone By Darren Allan published 28 November 24 Get your texts from space (sort of) as first satellite operator and cellular network collaboration is approved in the US.
Proton reaffirms commitment to security in independent audit By Mark Gill published 23 July 25 Proton's latest SOC2 Type II audit is a strong signal to business users. Here's all you need to know.
This new MVNO wants to let users pay with crypto - but security scrutiny may mean it never sees the light of day By Efosa Udinmwen published 27 December 25 Phreeli launches a privacy-oriented MVNO allowing crypto payments, eSIM activation, and unlimited plans, with security focused on compartmentalized data management.
Bluesky gets a massive video upgrade to tempt X fans who are frustrated by its cyberattack outages By Alex Blake published 11 March 25 The latest Bluesky update triples the social network’s video limit and adds other new features.
Cloud service Infomaniak steps up fight with Proton over controversial Swiss surveillance law By Chiara Castro last updated 6 June 25 Infomaniak criticised Proton's stance againt the amendment, causing a stir across the Swiss privacy tech sector
One small step for servers, one giant leap for Axiom Space and IBM Red Hat as prototype data center reaches the International Space Station By Wayne Williams published 15 September 25 Red Hat and Axiom sent a prototype data center to the International Space Station to test whether terrestrial computing systems can operate in orbit.
"It’s not about security, it’s about control" – How EU governments want to encrypt their own comms, but break our private chats By Chiara Castro published 25 October 25 Attending the 2025 Matrix conference made me think of the dual vision on encryption, dividing governments and citizens. I spoke to attendees to find out what they make of it.
ExpressVPN adds WireGuard to support industry transition to post-quantum VPNs By Christian Cawley last updated 13 August 25 With current encryption standards set to become obsolete, ExpressVPN introduces WireGuard with post-quantum protections
Worried about Chat Control? This website can help you get your say By Chiara Castro published 20 August 25 The controversial child sexual abuse (CSAM) scanning bill could be adopted as early as October 14, 2025, raising concerns among experts about citizens' communications privacy and security.