Cybersecurity online security privacy breaches – Breaking News & Latest Updates 2026
Skip to main content

Lock it down

A special issue from The Verge about protecting yourself online

An illustration of a laptop with three locks, a key, an at sign, a key and colorful pixels all randomly placed around the image.
Illustration by Maria Chimishkyan

There are a lot of ways things can go wrong online. Password databases get breached, personal data gets leaked, and trackers pop up where we least expect them. We don’t like to dwell on the bad side of the internet because we want technology to be fun — but there’s a lot of hard, careful work happening to get you there.

So this week, we’re putting together a guide to protecting yourself online. Some of it is basic hygiene — how to set up two-factor authentication, how to block tracking pixels in your email, and so on — but there are also a few more exotic problems in the mix, like Dogecoin scammers or the quantum security apocalypse. Taken together, it’s a full-spectrum reminder of all the things that can go wrong on the internet.

Stay safe out there.

Ten years of breaches in one image

Nearly 8 billion usernames have leaked since June 2011

Russell Brandom, Grayson Blackmon and 1 more
How to make your offline self harder to find online

You can’t wipe all your info off the internet — but you can make it less available

Rob Pegoraro
How to use a two-factor security key

Use hardware to keep your data safe

Stefan Etienne and Barbara Krasnoff
Is there any way out of Clearview’s facial recognition database?

The maddening logic of facial recognition

Dave Gershgorn
When does sharing become oversharing?

Sharing our personal lives online is important — but it’s dangerous, too

Nylah Iqbal Muhammad
The race is on for quantum-safe cryptography

New techniques could stand up to the power of a quantum computer — if we implement them in time

Sophia Chen
How to stop your emails from being tracked

Pixel trackers can hide in your email images

Barbara Krasnoff
Inside the cryptocurrency scam vortex

Hacks, fake hacks, and the new gold rush of crypto scams

Ryan Broderick
How to set up a VPN

Make sure you can surf safely

Shannon Liao
Ten years of breaches in one image

Nearly 8 billion usernames have leaked since June 2011

Russell Brandom, Grayson Blackmon and 1 more
How to make your offline self harder to find online

You can’t wipe all your info off the internet — but you can make it less available

Rob Pegoraro
How to use a two-factor security key

Use hardware to keep your data safe

Stefan Etienne and Barbara Krasnoff
Is there any way out of Clearview’s facial recognition database?

The maddening logic of facial recognition

Dave Gershgorn
When does sharing become oversharing?

Sharing our personal lives online is important — but it’s dangerous, too

Nylah Iqbal Muhammad
The race is on for quantum-safe cryptography

New techniques could stand up to the power of a quantum computer — if we implement them in time

Sophia Chen
How to stop your emails from being tracked

Pixel trackers can hide in your email images

Barbara Krasnoff
Inside the cryptocurrency scam vortex

Hacks, fake hacks, and the new gold rush of crypto scams

Ryan Broderick
How to set up a VPN

Make sure you can surf safely

Shannon Liao