How RFID Can Be Hacked and What You Can Do to Stay Safe

These days, RFID chips are present in all sorts of items: credit cards, library books, grocery goods, security tags, implanted pet details, implanted medical records, passports, and more. While this can be very convenient, a hacker can learn a lot about you from your RFID tags. Here’s the basics of how RFID can be hacked […]

Continue Reading

Yes, VPNs Can Be Hacked: What That Means for Your Privacy

We thought VPNs were secure, but with an increasing number of secure services reporting server breaches, that seems not to be the case. But how do these secure services get hacked in the first place, and how do hackers capitalize on it? Here’s how VPNs get hacked and what it means for your privacy. The […]

Continue Reading

5 Ways Your WhatsApp Messages Can Be Hacked

WhatsApp is a popular and easy to use messaging program. It has some security features, like the use of end-to-end encryption to keep messages private. However, hacks targeting WhatsApp could compromise the privacy of your messages and contacts. Here are five ways that WhatsApp can be hacked. 1. Remote Code Execution via GIF SONY DSC […]

Continue Reading

Hacked iPhones, Instagram Privacy, Awesome Discounts for Students

Megan Ellis and Christian Cawley catch up to bring you the latest tech news that matters in the Really Useful Podcast, the tech podcast for technophobes. This week, Megan has details about the launch of the Huawei Mate 30, an Android phone that significantly ships without Google apps. We also find out if your iPhone […]

Continue Reading

How to Spot If Gmail Has Been Hacked and What to Do Next

While you can reclaim your Gmail account from a hacker, it’s not always evident that your account is under attack in the first place. As such, it’s a good idea to learn about the tools and tricks available to you, so you can catch a hacker red-handed and protect your account. Let’s explore how to […]

Continue Reading