Brave Browser

Apps That Will Make Your Web Experience Safer And More Private

For many people (especially people who are just learning how to use the Internet), the Internet may feel like an unsafe minefield that exploits people for their personal information. It kind of is. After spending years on the Internet and researching it thoroughly, you will eventually become accustomed to the threats and avoid them more…

Super Mario Run being played on an iPhone 7

iOS Should Have A Permissions Screen

Apple has been leading the pack on user privacy for smartphones and tablets for years, and App Tracking Transparency (ATT) in iOS 14.5 is one of the most prominent examples of that so far. Despite offering a significantly higher security and privacy standard than Android, iOS users would still benefit from having a permissions screen.…

eufy security camera

eufy Camera Feeds Leaked To Strangers

Users of eufy smart home cameras (eufyCams) have been seeing the camera feeds of strangers, even in other countries. The controls of affected cameras are also accessible. eufyCams allow users to access their camera feeds anywhere in the world over the Internet. This feature (in any brand of camera) obviously poses a privacy and security…

Apple Releases Update For ACE Vulnerability In WebKit

Apple has released iOS 14.5.1, which provides a memory corruption bug fix and patches an arbitrary code execution (ACE) vulnerability in WebKit — a web browser engine. Arbitrary code execution refers to an attacker executing code that they should not be able to execute. A malicious website could theoretically execute harmful code on your iPhone,…

Command line interface

Giving Out Your E-mail Increases Your Chances Of Getting Hacked

Does it seem as if nearly every time you install an app, it wants you to register with your email or phone number? To add to that, these apps usually want loads of other sensitive information that they don’t need. This is because of desperate data collection attempts, as your personal information is like gold…

Bitcoin artwork on circuit board

Common Cryptocurrency Scams To Avoid

Cryptocurrency scammers are always on the prowl for unsuspecting victims, but they seem to come out in full force during bull runs. What is a bull run? A bull run is a rally in which cryptocurrency prices increase sharply, and for an extended time period. This attracts thieves who want to steal cryptocurrency while it…

Mann leaning against a wall in public, using a phone

The Pillars Of Location Tracking: How Your Phone Is Tracked Without Your Permission

It is now a well-established fact that your location is being tracked by tech companies. However, location tracking is not quite as simple as getting your coordinates from your GPS chip. It can be, but tech companies can do much more than that by tying together many bits and pieces of data that they gather…

Phone and a credit card

Understanding Android Permissions: An Android Security Guide

Android phones have privileges and permissions that control which areas of your phone a given app can access. There are permissions that you — the user can turn off, and there are also mandatory permissions that you are not allowed to disable (this is a failure to respect users’ preferences, but that’s a topic for…