Skip to Main Content

SecurityWatch

The online world is a sketchy place. Here's what you need to know to stay safe.

SecurityWatch
The online world is a sketchy place. Here's what you need to know to stay safe.

Latest Stories

Why You Need a Password Manager, and How to Choose the Right One

No one can remember every unique, strong password or passkey that you need to navigate life online safely. Here's how a password manager can help.

By Kim Key
A woman surrounded by password iconography

3 Simple Steps to Stop Apps From Collecting Your Data

Stop letting companies collect your data. Use these tips to keep your personal information safe.

By Kim Key
A locked safe against a red background

No Shame: How to Report When You've Been Scammed

Online scamming can happen to anyone, but that doesn't mean it's any less embarrassing or scary when it happens to you. We tell you why you should let your family and law enforcement know if you're a victim.

By Kim Key
tech icons over a yellow background

Learn From Jung Kook: 7 Important TikTok Privacy Tips

South Korean pop star and BTS member Jung Kook found out about TikTok’s privacy settings the hard way. Here's how to lock down your TikTok account to avoid making the same mistake.

By Kim Key
tiktok on smartphone screen

The Government Wants You to Fight Cybercrime. Do You Have What It Takes?

We talked to the Department of Homeland Security's Cyber Crimes Center to learn what it looks for when hiring special agents.

By Kim Key
A law enforcement cap against a red background

10 Tips for Safer Online Shopping

Follow these tips to keep criminals out of your accounts while shopping online.

By Eric Griffith  & Kim Key
online shopping artwork

Cybersecurity Checklist: Follow These Simple Steps to Break Bad Habits

Our security experts tell you how to change the way you interact online, lock down your devices, and clean up your digital spaces.

By Kim Key
checklist icons against a yellow background

How to Safely Get Rid of Your Old Phone or Tablet

Many people hold onto their old, unused phones and tablets. We tell you how to prepare your mobile device for recycling or trade-in.

By Kim Key
Phone and recycling icons against a green background

Stop Oversharing: How to Make Your Social Profiles Private

Your public posts online can make you an easy target for criminals of all kinds. We tell you how to lock down your social media accounts—and why you should.

By Kim Key
Collage of hands holding phones with generic social media sites pictured on screen

Swipe Left on These 5 Common Online Dating Scams

Nothing says love like a 'pig butchering' scam. We decode the meaning behind the scammy messages you see in dating apps.

By Kim Key
Illustration of a scammer on a dating site

4 Easy Ways to Stop Companies From Collecting Your Data

Your data is valuable, so businesses try to siphon it from your devices using apps and websites. We tell you how to keep corporations (and hackers) from collecting data without your consent.

By Kim Key
hands on red background

Passkeys: What They Are and Why You Need Them ASAP

Passkeys might be what finally puts an end to passwords for good. Here's how they work, where you can use them, and why they keep your accounts safe.

By Kim Key
A key on a blue background with password icons

How to Hide Your Home From Google Street View

It's easy to keep your living situation away from prying eyes—but consider the consequences of masking your property, too.

By Kim Key
person using map against blue background

The Scariest Hacks, Bugs, and Scams We Saw at Black Hat 2024

AI, terrifying vulnerabilities, and privacy worries abound at the annual cybersecurity conference.

By Kim Key  & Neil J. Rubenking
Black Hat audience awaits the first day's keynote

Meet the Criminals Behind Southeast Asia's Lucrative Online Gambling Websites

At Black Hat, researchers reveal a network of scammers who force people to work for sketchy gambling sites and evade detection through a sophisticated tech suite.

By Kim Key
Gambling imagery on a red background

70% AI? Adobe Talks Verifying Content in the Age of Deepfakes

At Black Hat, Adobe outlines how to quickly identify altered media with tools that function like nutrition labels for digital content.

By Kim Key
A nutrition label on a beige background

Just the Hacks: How Journalists Work With Hackers to Break News

Hackers reach out to reporters to let them know about their latest conquests, but it's a delicate balance between informing the public and giving bad actors a platform.

By Kim Key
Two people looking concerned near a computer

US Cybersecurity Chief: Don't Get Your Election Info From Influencers

At Black Hat, Jen Easterly, director of the US Cybersecurity and Infrastructure Security Agency, urges voters to be discerning and get election information from local, state, and federal officials.

By Kim Key
ballot box on blue background

What Is Stalkerware? How to Find and Remove It

Obsessed exes can use stalkerware to turn your phones and PCs into listening devices that report everything you do. We show you how to protect yourself.

By Kim Key
Eyes surround a person on their phone

These Conversations Can Help Uncover Your Teen's Secret Online Life

Teens don't want to be spied on, but they need to be protected from internet dangers. We tell you how to establish trust with your kids while learning the challenges they face online.

By Kim Key
Girl holding phone against a yellow background