Skip to main content
Sign up to Newsletter
SEARCH
NEWS
GUIDES
CAMPAIGNS
LEARN
IMPACT
ABOUT
DONATE
Search
Content type:
Report
We looked into the software support practices for 5 of the most popular smart devices (and the results may disappoint you)
20th October 2022
Content type:
Press release
Privacy International research shows that smart device security updates fail to meet consumers' expectations
20th October 2022
Content type:
Advocacy
PI's proposed amendments to the draft Directive on empowering consumers for the green transition
10th October 2022
Content type:
Advocacy
An overbroad, unbalanced and dangerous UN cybercrime treaty must be rejected
7th August 2024
Content type:
Advocacy
Privacy International's comments on the updated draft text of the UN Cybercrime Convention (May 2024)
17th June 2024
Content type:
Examples
Technical analyst explains inner workings of UK's NHSx contact tracing
20th May 2020
Content type:
Examples
Smartphones, laptops, IoT devices vulnerable to new BIAS Bluetooth attack
19th May 2020
Content type:
Report
Facebook Must Explain What it's Doing With Your Phone Number (Update)
24th June 2019
Content type:
Explainer
Push This Button For Evidence: Digital Forensics
24th June 2019
Content type:
News & Analysis
Ghosts in Your Machine: Spooks Want Secret Access to Encrypted Messages
29th May 2019
Content type:
Case Study
"Betrayed by an app she had never heard of" - How TrueCaller is endangering journalists
28th May 2019
Content type:
Examples
Google launches encryption for lower-powered phones
17th May 2019
Content type:
Long Read
Data Exploitation and Democratic Societies
1st May 2019
Content type:
News & Analysis
What types of data can law enforcement extract from my phone?
30th April 2019
Content type:
Examples
‘BlueBorne’ Flaw Poses Serious Risk To Bluetooth Devices
1st April 2020
Content type:
Examples
Design flaw leaves Bluetooth devices vulnerable
1st April 2020
Content type:
Examples
Critical Bluetooth Vulnerability in Android (CVE-2020-0022) – BlueFrag
1st April 2020
Content type:
News & Analysis
Guía Básica de Seguridad Digital para Startups
18th June 2018
Content type:
News & Analysis
El rol de la OEA en la agenda regional sobre seguridad digital
13th June 2018
Content type:
News & Analysis
Fe ciega: Identidad biométrica en Perú crece sin control ni garantías
8th June 2018
Content type:
News & Analysis
Forthcoming research investigates whether biometric voter register was misappropriated for political campaigns in Kenya
18th December 2017
Content type:
Examples
US intelligence chiefs warn of new data manipulation cyber threat
3rd May 2018
Content type:
Long Read
Cyber Security Awareness Month: Privacy and Security Must Go Together
8th October 2018
Content type:
Examples
Large telco secretly opens bank accounts using Aadhaar-linked eKYC
26th September 2018
Content type:
Explainer graphic
Understanding the Difference between Cyber Security and Cyber Crime
1st October 2018
Content type:
Explainer graphic
Understanding the Difference between Cyber Security and Cyber Crime
1st October 2018
Content type:
Advocacy
After the Gold Rush: Developing Cyber Security Frameworks and Cyber Crime Legislation to Safeguard Privacy and Security
1st October 2018
Content type:
News & Analysis
Communities at risk: How security fails are endangering the LBGTIQ+ community
15th April 2019
Content type:
Explainer graphic
Police mobile phone extraction explainer
14th February 2019
Content type:
Long Read
Data Privacy Week: Working Towards Change
31st January 2019
Pagination
First page
« First
Previous page
‹‹
Page
1
Current page
2
Page
3
Next page
››
Last page
Last »
Get Involved
Act with Us
Donate
Join