• Skip to main content
  • Skip to header right navigation
  • Skip to after header navigation
  • Skip to site footer
RestorePrivacy

RestorePrivacy

Your online privacy resource center

  • Home

General

Home

News

About

Contact

Privacy Tools

  • Secure Browsers
  • Secure Email
  • Private Search Engine
  • Best VPN Services
  • Data Removal Services
  • Best Password Managers
  • Secure Messaging Apps
  • Ad Blockers
  • Identity Theft Protection

Newsletter

Coming soon.

No spam, ever.

  • Home
  • News
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Identity Theft
    • Identity Theft Protection
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Tools
    • Secure Browser
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Info
    • Mission and Site Guidelines
    • Press
    • Contact

Privacy and Security News

Signal Messenger Introduces Usernames to Hide Phone Numbers

Signal Messenger Introduces Usernames to Hide Phone Numbers

February 21, 2024 by Heinrich Long

The Signal messenger app will soon begin rolling out usernames to replace phone numbers, making them the default option from now on. This is a feature …

LockBit Ransomware Operation Disrupted, Free Decryptors Available

LockBit Ransomware Operation Disrupted, Free Decryptors Available

February 20, 2024 by Heinrich Long

An international law enforcement operation codenamed ‘Cronos,’ involving the FBI, the U.S. Department of Justice, the NCA, Europol, and …

Skiff Mail Shutting Down

Skiff Mail Shutting Down in 6 Months (Try These Alternatives)

February 19, 2024 by Heinrich Long

Skiff, the popular encrypted email service provider, was acquired by the Evernote note-taking app maker Notion, and will become part of the …

DuckDuckGo Introduces E2EE Backup and Sync Feature on Browser

DuckDuckGo Introduces E2EE Backup and Sync Feature on Browser

February 14, 2024 by Heinrich Long

DuckDuckGo has just introduced a new data backup and syncing feature on its web browser that uses end-to-end encryption to keep the data protected …

Hacker Leaks Alleged Facebook Marketplace Database Exposing 200k Users

Hacker Leaks Alleged Facebook Marketplace Database Exposing 200k Users

February 13, 2024 by Alex Lekander

The notorious threat actor ‘IntelBroker’ has leaked a database allegedly stolen from Facebook, which contains 200,000 Facebook Marketplace …

DNS Requests of 1% of ExpressVPN Windows Users Leaked to ISPs

DNS Requests of 1% of ExpressVPN Windows Users Leaked to ISPs

February 8, 2024 by Heinrich Long

ExpressVPN has informed its customers that a vulnerability in the latest version of its Windows app has exposed the DNS requests of a small subset of …

Fake LastPass Password Manager App Appears on Apple's App Store

Fake LastPass Password Manager App Appears on Apple’s App Store

February 8, 2024 by Heinrich Long

LastPass has warned about a fake app mimicking its software on the Apple App Store, urging customers seeking to download their favorite password …

Raspberry Robin Uses Custom 1-Day Exploits Against Windows Systems

Raspberry Robin Uses Custom 1-Day Exploits Against Windows Systems

February 7, 2024 by Heinrich Long

Raspberry Robin has been using custom exploits for at least two 1-day local privileged escalation (LPE) flaws in Windows. Raspberry Robin is a …

Thousands of AnyDesk Accounts Offered for Sale Following Hack

Thousands of AnyDesk Accounts Offered for Sale Following Hack

February 5, 2024 by Heinrich Long

Threat actors are selling over 18,317 AnyDesk credentials on the hacking forum “Exploit[.]in” for $15,000, one day after the maker of the …

Internet Giant Cloudflare Hacked by Nation-State Using Okta Token

Internet Giant Cloudflare Hacked by Nation-State Using Okta Token

February 2, 2024 by Heinrich Long

Cloudflare announced it detected unauthorized access to their self-hosted Atlassian server, resulting in a limited-scope data breach. Cloudflare is a …

US Disrupts Chinese Botnet Supporting Attacks on Critical Systems

US Disrupts Chinese Botnet Supporting Attacks on Critical Systems

January 31, 2024 by Heinrich Long

The US government has disrupted a botnet operated by Chinese state-sponsored hackers known as “Volt Typhoon,” known for attacking critical …

Russia to Block All Sites Hosted on Unregistered Providers in February

Russia to Block All Sites Hosted on Unregistered Providers in February

January 29, 2024 by Heinrich Long

All websites hosted on foreign hosting providers not registered in Russia will be blocked starting from February 1, 2024. This is according to …

Database With Info on 750 Million Telecom Subscribers Sold Online

Database With Info on 750 Million Telecom Subscribers Sold Online

January 26, 2024 by Heinrich Long

Cybercriminals have put up for sale on a popular hacker forum a massive set comprising records of 750 million people from India, customers of several …

MOAB Mother of All Breaches 2024

Why You Shouldn’t Be Worried About MOAB, the “Mother of All Breaches”

January 24, 2024 by Heinrich Long

A supermassive data leak comprising 26 billion records, dubbed the “mother of all breaches” (MOAB), has been discovered, and many media …

Zero-Click Bluetooth Attack Impacts Unpatched Android Phones

Zero-Click Bluetooth Attack Impacts Unpatched Android Phones

January 23, 2024 by Heinrich Long

Security researcher ‘Mobile Hacker’ has demoed a zero-click attack that leverages recently disclosed Bluetooth vulnerabilities to install a Metasploit …

  • Previous
  • Page 1
  • Interim pages omitted …
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Interim pages omitted …
  • Page 21
  • Next

Sidebar

Follow Us:

  • X
  • Mastodon
  • Facebook

Digital Privacy Essentials:
Secure Browser
Private Search Engines
Secure Email
Best Password Managers
Secure Messaging Services
Best Ad Blockers
Best VPN Services
Secure Cloud Storage

Privacy & Security Guides:
Privacy Tools
Alternatives to Google Products
Firefox Privacy Modifications
Five Eyes, 9 Eyes, 14 Eyes Spying
Browser Fingerprinting
Is Tor Safe?
Alternatives to Gmail
VPN vs Tor
Alternatives to WhatsApp
Is Your Antivirus Spying on You?
Controlling Communication Channels is Crucial for Privacy
Anonymity Networks: VPNs, Tor, and I2P
How to Really Be Anonymous Online
Private and Anonymous Payments

Secure Email Reviews:
ProtonMail Review
Tutanota Review
Mailfence Review
Mailbox.org Review
Hushmail Review
Posteo Review
Fastmail Review
Runbox Review
CTemplar Review
Temporary Email Services
Encrypted Email

Password Manager Reviews:
Bitwarden Review
LastPass Review
KeePass Review
NordPass Review
Dashlane Review
1Password Review
Best Password Managers

Secure Messaging App Reviews:
Wire Review
Signal Review
Threema Review
Telegram Review
Session Review
Wickr Review

Secure Cloud Storage Reviews
Tresorit Review
MEGA Cloud Review
Sync.com Review
Nextcloud Review
IDrive Review
pCloud Review
SpiderOak Review
NordLocker Review

How To Guides
How to Encrypt Files on Windows
How to Encrypt Email
How to Configure Windows 10 for Privacy
How to use Two-Factor Authentication (2FA)
How to Secure Your Android Device for Privacy
How to Secure Your Home Network
How to Protect Yourself Against Identity Theft
How to Unblock Websites
How to Fix WebRTC Leaks
How to Test Your VPN
How to Hide Your IP Address
How to Create Strong Passwords
How to Really Be Anonymous Online

About RestorePrivacy

Contact

About

RestorePrivacy is a digital privacy advocacy group committed to helping you stay safe, secure, and private online. You can support this project through donations, purchasing items through our links (we may earn a commission at no extra cost to you), or sharing this information with others. See our mission here.

  • X
  • Facebook
  • Mastodon

And for cybersecurity news, check out CyberInsider.

Digital privacy Checklist:

  1. Secure browser: Brave or Modified Firefox
  2. VPN: NordVPN (74% off coupon)
  3. Ad blocker: uBlock Origin or AdGuard
  4. Secure email: ProtonMail or StartMail
  5. Secure messaging: Signal or Threema
  6. Private search engine: MetaGer or Brave
  7. Password manager: NordPass or Bitwarden
  8. Identity theft protection: Aura
  9. Data removal service: Incogni

Copyright © 2025 Restore Privacy, LLC · Privacy Policy · Terms of Use · Contact · Sitemap · All Rights Reserved