• Skip to main content
  • Skip to header right navigation
  • Skip to after header navigation
  • Skip to site footer
RestorePrivacy

RestorePrivacy

Your online privacy resource center

  • Home

General

Home

News

About

Contact

Privacy Tools

  • Secure Browsers
  • Secure Email
  • Private Search Engine
  • Best VPN Services
  • Data Removal Services
  • Best Password Managers
  • Secure Messaging Apps
  • Ad Blockers
  • Identity Theft Protection

Newsletter

Coming soon.

No spam, ever.

  • Home
  • News
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Identity Theft
    • Identity Theft Protection
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Tools
    • Secure Browser
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Info
    • Mission and Site Guidelines
    • Press
    • Contact

Alex Lekander

WhatsApp Signal Threema location attack leak

Timing Attacks on WhatsApp, Signal, and Threema can Reveal User Location

October 20, 2022 by Alex Lekander

Researchers have identified a vulnerability that undermines location privacy for users of WhatsApp, Signal, and Threema. This report examines the …

Fast Company hack breach apple news leak

How Fast Company’s Failure to Secure its Website Resulted in Apple News Profanity Two Days Later

September 27, 2022 by Alex Lekander

Two days ago, on September 25th, Fast Company’s website was hacked and publicly defaced, with the hacker discussing the exploits on a hacking …

IPCA Laboratories data breach

RansomHouse Cyber Gang Claims Ipca Laboratories as Latest Victim

September 9, 2022 by Alex Lekander

RansomHouse, a cyber extortion gang that gained international notoriety in June with the breach of AMD, has now announced another well-known victim …

Cisco Systems data breach 2022

Yanluowang Ransomware Group Claims Cisco Systems as Latest Victim

August 10, 2022 by Alex Lekander

Yanluowang ransomware group has just claimed Cisco Systems as its latest victim. We have analyzed the file tree sample provided by Yanluowang to …

Twitter data breach

Twitter Now Acknowledges Security Bug That Exposed Data from 5.4+ Million Accounts

August 5, 2022 by Alex Lekander

Last month we were the first to report on a breaking data security incident involving Twitter and a database compiled from 5.4 million accounts that …

Twitter data breach 2022

Verified Twitter Vulnerability Exposes Data from 5.4 Million Accounts

July 21, 2022 by Alex Lekander

A verified Twitter vulnerability from January has been exploited by a threat actor to gain account data allegedly from 5.4 million users. While …

China Data Leak passports

New China Data Leak Exposes Former President Obama and Other Foreign Nationals Who Visited Shanghai (44m Records)

July 6, 2022 by Alex Lekander

Hot on the heels of the largest database in Chinese history with 1 billion records leaked, a new Chinese database of visiting foreign nationals is …

RansomHouse Leak Breach

RansomHouse Extortion Group Claims AMD as Latest Victim

June 27, 2022 by Alex Lekander

Update: AMD has acknowledged the potential breach and has provided us with a statement. RansomHouse, a relatively new data-extortion cybercrime group, …

LendingTree Data Breach

Hacker Leaks Database Claiming to be from LendingTree

June 21, 2022 by Alex Lekander

A threat actor has released a large database on a popular hacking forum that allegedly came from LendingTree.com. We have analyzed the data and …

Telegram privacy user data government

Is Telegram Sharing User Data with Government Agencies?

June 16, 2022 by Alex Lekander

Telegram’s website states that a disclosure of user data to government agencies “has never happened.” However, a recent …

Florida Department of Veterans Affairs Data leak

Florida Department of Veterans Affairs Data Leaked on Dark Web

June 6, 2022 by Alex Lekander

A few weeks ago we first reported on the Quantum ransomware gang claiming the Florida Department of Veterans Affairs as a victim. A spokesperson for …

Florida Department of Veterans Affairs Ransomware Quantum FDVA

Quantum Ransomware Gang Claims Florida Dept. of Veterans Affairs as Latest Victim

May 27, 2022 by Alex Lekander

Update: The Director of Communications for the Florida Department of Veterans Affairs has commented on the situation, posted below. The well-known …

  • Previous
  • Page 1
  • Interim pages omitted …
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Interim pages omitted …
  • Page 9
  • Next

Sidebar

Follow Us:

  • X
  • Mastodon
  • Facebook

Digital Privacy Essentials:
Secure Browser
Private Search Engines
Secure Email
Best Password Managers
Secure Messaging Services
Best Ad Blockers
Best VPN Services
Secure Cloud Storage

Privacy & Security Guides:
Privacy Tools
Alternatives to Google Products
Firefox Privacy Modifications
Five Eyes, 9 Eyes, 14 Eyes Spying
Browser Fingerprinting
Is Tor Safe?
Alternatives to Gmail
VPN vs Tor
Alternatives to WhatsApp
Is Your Antivirus Spying on You?
Controlling Communication Channels is Crucial for Privacy
Anonymity Networks: VPNs, Tor, and I2P
How to Really Be Anonymous Online
Private and Anonymous Payments

Secure Email Reviews:
ProtonMail Review
Tutanota Review
Mailfence Review
Mailbox.org Review
Hushmail Review
Posteo Review
Fastmail Review
Runbox Review
CTemplar Review
Temporary Email Services
Encrypted Email

Password Manager Reviews:
Bitwarden Review
LastPass Review
KeePass Review
NordPass Review
Dashlane Review
1Password Review
Best Password Managers

Secure Messaging App Reviews:
Wire Review
Signal Review
Threema Review
Telegram Review
Session Review
Wickr Review

Secure Cloud Storage Reviews
Tresorit Review
MEGA Cloud Review
Sync.com Review
Nextcloud Review
IDrive Review
pCloud Review
SpiderOak Review
NordLocker Review

How To Guides
How to Encrypt Files on Windows
How to Encrypt Email
How to Configure Windows 10 for Privacy
How to use Two-Factor Authentication (2FA)
How to Secure Your Android Device for Privacy
How to Secure Your Home Network
How to Protect Yourself Against Identity Theft
How to Unblock Websites
How to Fix WebRTC Leaks
How to Test Your VPN
How to Hide Your IP Address
How to Create Strong Passwords
How to Really Be Anonymous Online

About RestorePrivacy

Contact

About

RestorePrivacy is a digital privacy advocacy group committed to helping you stay safe, secure, and private online. You can support this project through donations, purchasing items through our links (we may earn a commission at no extra cost to you), or sharing this information with others. See our mission here.

  • X
  • Facebook
  • Mastodon

And for cybersecurity news, check out CyberInsider.

Digital privacy Checklist:

  1. Secure browser: Brave or Modified Firefox
  2. VPN: NordVPN (74% off coupon)
  3. Ad blocker: uBlock Origin or AdGuard
  4. Secure email: ProtonMail or StartMail
  5. Secure messaging: Signal or Threema
  6. Private search engine: MetaGer or Brave
  7. Password manager: NordPass or Bitwarden
  8. Identity theft protection: Aura
  9. Data removal service: Incogni

Copyright © 2025 Restore Privacy, LLC · Privacy Policy · Terms of Use · Contact · Sitemap · All Rights Reserved