Please turn on your JavaScript for this page to function normally.
Europe
As UK govt calls for encryption backdoors, EU lawmakers propose a ban on them

As the UK gets hit by terror attacks one after the other, the government’s cry for making sure terrorists and criminals can’t find “safe spaces” online …

vote
Sensitive data on 198 million US voters exposed online

For at least two whole weeks, a database containing information on 198 million potential US voters – more than half of the American population – lay exposed on the …

Android malware
Google’s whack-a-mole with Android adware continues

Why can’t Google put a stop to adware on their official Android app marketplace? The analysis by Trend Micro researchers of a Trojan Android ad library dubbed Xavier …

extortion
Cyber extortionists target North American companies

A group of financially motivated hackers is targeting networks and systems of North American companies, threatening to leak the stolen information and cripple the company by …

world intelligence
BAE Systems sold cyber-surveillance tools to autocratic regimes

British multinational BAE Systems has sold sophisticated surveillance technology to many repressive governments in the Middle East and Africa, an investigation by BBC Arabic …

CIA
How the CIA hacked wireless home routers

For many years, the CIA has had the capability to compromise a wide range of commercial wireless routers, and to monitor, control and manipulate the traffic passing through …

biohazard
US restaurants targeted with fileless malware

Morphisec researchers have spotted another attack campaign using fileless malware that is believed to be mounted by the infamous FIN7 hacking group. The goal of the campaign …

quantum
End-to-end email encryption with no central point of attack

A seamless, easy-to-use, and secure end-to-end encrypted business collaboration tool with no central point of attack is a holy grail for every business, and Boston-based …

fake news
Fake news services and tools proliferate on online markets

Fake news is not a new concept, but the Internet – and social media and networks in particular – have made it infinitely easier for it to spread and reach its …

person
Could an independent NGO solve the problem of cyber attack attribution?

Cyber attack attribution is a necessary prerequisite for holding actors accountable for malicious cyber activity, but is notoriously difficult to achieve. Perhaps it’s …

GDPR
Why companies shouldn’t dread the advent of GDPR

The main aim of the General Data Protection Regulation (GDPR) is to make sure that the data of EU citizens is protected, no matter where it’s held. The regulation, which will …

architect
What’s an IT architect, and could you become one?

If you’re a Computer Science student or an IT professional looking for a new job that’s interesting, well paid, and for which demand is constant, you might want to …

Don't miss

Cybersecurity news