Browsers are phasing out third-party cookies. Google needs a cookie replacement that respects your privacy, fast. Is FLoC the answer?
We take a look at a study which dives into the connection between popular UK based charity organisations and tracking, Real Time Bidding, and data analysis
We take a deep dive into the IcedID Trojan, describing the new payloads of this advanced malware.
Threat actors combine phishing with a web skimmer to create a devious scheme designed to lift credit card data from unaware shoppers.
When it comes to cybersecurity, journalists need to protect themselves, their sources, and the freedom of the press. Which methods should they use?
Last week, the FTC announced its settlement with Google over YouTube’s COPPA violations, including requirements for better protecting children’s data. But is it enough?
TrickBot’s latest feature allows it to tamper with the web sessions of users from Verizon, T-Mobile, and Sprint mobile carriers.
We look at recent research exploring the threat of clickjacking, along with other solutions considered by site owners and analysts for protecting users against these online attacks.