Securing your digital life, the finale: Debunking worthless “security” practices

Securing your digital life, part two: The bigger picture—and special circumstances

Securing your digital life, part one: The basics

Apple forgot to sanitize the Phone Number field for lost AirTags

Three iOS 0-days revealed by researcher frustrated with Apple’s bug bounty

Security audit raises severe warnings on Chinese smartphone models

Nation-state espionage group breaches Alaska Department of Health

Security researchers at Wiz discover another major Azure vulnerability

Infosec researchers say Apple’s bug-bounty program needs work

“Worst cloud vulnerability you can imagine” discovered in Microsoft Azure