Computing Security
Explore Computing Security
Latest about Computing Security

Chrome to adopt NIST-approved post quantum encryption on desktop
By Chiara Castro published
Google is switching from the Kyber-based algorithm to the new standard to mitigate risks from "store now, decrypt later attacks."

The EU still wants to scan your private chats – here's what you can do about it
By Chiara Castro published
The controversial CSAM scanning proposal is back on the agenda. Here's what we know so far and what you can do about it.

The privacy paywall has landed in the UK – here's what you can do about it
By Chiara Castro published
After Europe, some of the most-read UK newspapers are testing out the 'Pay and Consent' model. Here are some tips to claim back your privacy.

Predator spyware is still active and more difficult to track – here's how to stay safe
By Chiara Castro published
"Predator is far from disappearing," said experts, as they detect the mercenary spyware in multiple countries. Here are some tips to reduce the risk of becoming a target.

If we want to still have privacy, we need to ban spyware
By Chiara Castro published
Civil societies are calling on the EU to take more decisive action against spyware's threats to fundamental rights. But this is a global problem.

Telegram's CEO faces criminal charges – how will this affect users' privacy?
By Chiara Castro published
Pavel Durov has now been released but is still under investigation for allegedly allowing criminal activity on the platform.

Text spammers are getting creative and trying to play on your emotional needs – don't fall for it
By Lance Ulanoff published
Smishing is spam text phishing attempts that use social engineering to steal your previous info and more. Here's how I combat it.

Forget pay to view, pay for privacy is the latest problem for people online
By Chiara Castro published
After Europe, the 'Pay and Consent' model arrives in the UK - and that's bad news for your privacy online.
Get daily insight, inspiration and deals in your inbox
Sign up for breaking news, reviews, opinion, top tech deals, and more.