Computing Security
Explore Computing Security
Latest about Computing Security

How to use iOS 18 Locked and Hidden Apps features – and why you should
By Chiara Castro published
You can now hide and lock your applications to boost your mobile privacy and security. Here's how and when you should use it.

Chrome to adopt NIST-approved post quantum encryption on desktop
By Chiara Castro published
Google is switching from the Kyber-based algorithm to the new standard to mitigate risks from "store now, decrypt later attacks."

The EU still wants to scan your private chats – here's what you can do about it
By Chiara Castro published
The controversial CSAM scanning proposal is back on the agenda. Here's what we know so far and what you can do about it.

The privacy paywall has landed in the UK – here's what you can do about it
By Chiara Castro published
After Europe, some of the most-read UK newspapers are testing out the 'Pay and Consent' model. Here are some tips to claim back your privacy.

Predator spyware is still active and more difficult to track – here's how to stay safe
By Chiara Castro published
"Predator is far from disappearing," said experts, as they detect the mercenary spyware in multiple countries. Here are some tips to reduce the risk of becoming a target.

If we want to still have privacy, we need to ban spyware
By Chiara Castro published
Civil societies are calling on the EU to take more decisive action against spyware's threats to fundamental rights. But this is a global problem.

Telegram's CEO faces criminal charges – how will this affect users' privacy?
By Chiara Castro published
Pavel Durov has now been released but is still under investigation for allegedly allowing criminal activity on the platform.

Don’t be fooled during back-to-school: These are the Amazon scams currently targeting students that you need to watch out for
By Darren Allan published
Here’s how to keep yourself safe from the most common Amazon scams right now aimed at students.
Get daily insight, inspiration and deals in your inbox
Sign up for breaking news, reviews, opinion, top tech deals, and more.