Latest news

How to Detect and Avoid Surveillance on Your Work PC
Nowadays, it’s common for employers to monitor employee activities on work computers. This surveil...

Beyond Facetune: Privacy Concerns in Appearance-Altering Apps
While apps like Facetune might seem like harmless fun, offering the ability to erase blemishes, whit...

The UEFA App And Privacy
The UEFA European Championship ticketing app has become a hotbed of controversy due to its collectio...

The "Pay or Consent" Showdown: Why Meta's Ad Model Faces Consequences
The European Union's (EU) recent lawsuit against Meta, formerly Facebook, over its "pay or consent" ...

Targeted Ads: How Do They Know (Almost) Everything You Do
Have you ever noticed how after casually mentioning a new pair of running shoes to a friend, you're ...

Dual-Engine Defense: Combining Signature-based and AI-powered Antivirus Protection
The ever-evolving landscape of cyber threats demands a multi-layered approach to security. Antivirus...

EU's Chat Control 2.0: Is It a Threat to Privacy and Democracy?
The European Union (EU) is renowned for its commitment to human dignity, freedom, democracy, equalit...

Protectstar™ again receives AV-TEST certification for Antivirus AI for Android
The latest version 2.0 of Protectstar's Antivirus AI for Android has once again received the prestig...

The Cybersecurity Risks of Automatic Backups on Phones and Computers
The convenience of automatic backups on phones and computers is undeniable.Your valuable documents, ...

Pegasus: Who Is Spying On You?
Imagine your phone is compromised without you even knowing it. What do you do, and how do you keep y...

The Digital Footprint: How to Check And Erase It
We all leave trails online, as well as a record of our activities known as a digital footprint. Webs...

Two-Factor Authentication: What is it, how does it work and more
Imagine your front door has two locks. One is your key (your password), the other a constantly chang...