March 27 DarkSword leak puts millions of iPhone users at risk A leaked hacking tool called DarkSword could expose older iPhones and iPads to attacks through malicious links and compromised websites.
March 27 5 simple tech tips to take back control of your social media Social media apps track users' clicks, contacts and location. These five privacy tips can help limit data collection on iPhone and Android.
March 26 Stefanik grills University of Michigan leader on lack of audit after string of Chinese national arrests University of Michigan's interim president was questioned about an audit after a string of arrests of Chinese students related to national security.
March 22 YouTube job scam text: How to spot it fast YouTube job scams sent via text are spreading globally, Google warns. Learn the key warning signs, including unrealistic pay and requests to move chats to Telegram or WhatsApp.
March 21 Fake Google security page can turn your browser into a spying tool Security researchers say a phishing scam impersonates Google to install malware that steals 2FA codes, tracks location and spies on clipboard data.
March 20 FBI warns Russian hackers targeting Americans on Signal; thousands of accounts compromised The FBI warned that Russian intelligence-linked hackers are targeting Signal users, including U.S. officials and journalists, compromising thousands of accounts.
March 20 Hospital cyberattacks threaten patient safety Medical data breaches expose patient records and Social Security numbers that cannot be replaced. Security expert Ricardo Amper provides essential steps for patients.
March 19 Phishing scam exploits Apple Mail 'trusted sender' label Apple Mail's "trusted sender" banner can reportedly mislead users into phishing scams. Learn how scammers exploit this security feature to deceive victims.
March 19 Uber expands women driver preference nationwide Uber's Women Preferences feature lets female riders request female drivers nationwide for added safety and comfort during their rides, the company says.
March 16 How debit card fraud can happen without using the card A fraud attempt on a never-used debit card reveals a surprising way criminals can exploit card numbers digitally without physical access.