Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 40% discount At Black Hat,...
VPNs hide your IP address and stop your ISP from seeing your traffic, but they won't make you anonymous and they won't stop hackers. This is what a VPN can...
Apple confirmed it pulled a viral "dating" app after a massive data breach and privacy failures. 72,000 images, including photo IDs, were exposed. Here’s why ID uploads are risky and...
Researchers have exposed 3.5 billion WhatsApp numbers due to a massive Meta security flaw. Learn how the contact discovery tool was exploited to scrape data and what this means for...
Is Germany about to make ad blockers a copyright liability? In this video I test Brave vs Chrome on a heavy ad site to show how pop-ups, tracking, fingerprinting, auto-play...
Governments say we must submit passports and IDs to “protect children” and make the internet safer. But what happens to your data after you hand it over? In this video,...
AWS outage on Oct 20 affected millions after a DNS resolution failure in the DynamoDB API (us-east-1). Here’s what happened, why centralization hurt, and key DNS lessons you should know....
They are now talking about age verification on VPNs. They want to lock down VPNs. But where will this end? Explore the alarming truth about the UK's Online Safety Act...
Instagram privacy alert: friends and parents can expose child photos via Threads crossposting and recommendations. Learn which settings to change and protect minors online. #instagram #privacy #meta
Nearly half of mobile apps contain hardcoded secrets A new Sept. 18 report from Zimperium highlights that once APIs are embedded into app code, they become visible and exploitable, turning...
Cloud-reliant gadgets can become pricey paperweights when support ends. This short breaks down smart speaker shutdowns, vendor lock-in, and safer offline buys for privacy and security. #bose #cloud #privacy
This video explains how disposable (“temp”) email services like Guerrilla Mail and Temp Mail work, when to use them to avoid spam and protect your real inbox, and their limitations/risks...