A beginner's guide to analyzing the network traffic of apps and websites
In 2025, journalist Zack Whittaker found three popular apps were leaking sensitive user data. This is how he uses network analysis tools like Burp Suite to understand how apps and websites work and share your data. This is how you can, too.
FBI agents visited my home about an article I wrote, and now I can't go to Mexico
Mexico formally requested the FBI's help in seeking answers about one of my stories. Having federal agents on my doorstep sparked my own years-long effort to pry information out of the FBI to explain why it came to my house to begin with.
How tech giants track you across the web, even if you don't use their apps
Ad tech giants use near-invisible "pixels" on web pages to track what you do online, even if you don't have an account or use their apps. Thankfully, there is a solution.
Apple's Lockdown Mode: Once an 'extreme' security protection, now a necessity for Americans
An optional "extreme" security feature that Apple has baked-in to modern iPhones, iPads, Macs, and Watches has passed a significant real-world test.
New survey reveals how security researchers and journalists experience legal and criminal threats
Over 100 security researchers and journalists answered our survey and told us how they experienced threats for doing their work. Here are some of the top takeaways.
Another huge leak of passwords is the tip of the infostealing iceberg
An unprotected database that spilled 149 million usernames and passwords to the web shines new light on how infostealing malware powers cybercrime.
TriZetto failed to stop hackers stealing Americans' health data for a year
The health tech giant, which supports 200 million people, said hackers accessed sensitive personal and health data, and has begun notifying millions of victims.
ClickFix attacks are increasingly devious, dangerous, and can hack you in an instant
These attacks spoof Windows errors, CAPTCHAs, and real login pages to trick victims into hacking themselves with malware that skirts common cyber defenses.
Apple nuking a customer's account over a bad gift card is a warning for everyone
One long-time Apple customer was left with no recourse after a bad gift card triggered a full account and device lock-out.
Last-minute cybersecurity and privacy gifts your friends and family won't hate
Running out of gift ideas for the security or privacy buff in your life? Here are some thoughtful suggestions, including what tech you might want to avoid.
I've investigated 'stalkerware' for five years. Here's what I've learned
Stalkerware is a pervasive surveillance used by millions around the world, but these operations keep getting hacked and leaking victims' private phone data.
Banning TP-Link won't save America from its own terrible cybersecurity
TP-Link routers face a ban in the U.S. over the company's alleged links to China, but shoddy cybersecurity is the real insider threat to the United States.