Please turn on your JavaScript for this page to function normally.
bully
UK prosecutors get new guidelines for pursuing cyberbullies, stalkers

Cyber bullying, virtual mobbing, doxxing, cyber stalking and harassment, revenge pornography – these are just some of the behaviors that the Internet and social media …

USA flag
US officially accuses Russia of hacking to influence presidential election

With just a month left until the 2016 United States presidential election, the Department of Homeland Security and Office of the Director of National Intelligence officially …

IoT world
Reposify: An IoT search engine that you can integrate into your products

With the unstoppable rise of the Internet of Things, and the still inevitable reality of their fundamental insecurity, knowing where, what and how secure they are is crucial …

online shop owned
100+ online shops compromised with payment data-stealing code

Since March 2016 (and possibly even earlier), someone has been compromising a variety of online shops and injecting them with malicious JavaScript code that exfiltrates …

OverSight
OverSight detects when Mac malware uses built-in camera, mic

Users who want to be warned each time their Mac’s camera and microphone are switched on – either by a legitimate process or, more importantly, by malware – …

sign
Security fatigue is real – we need usable security

A preliminary study involving 40 computer users of different ages, occupations, and living in different settings has shown what most of use already know to be true: security …

Hook Up Dating app
Database containing info of 1.5 million online daters found leaking

Sensitive personal information of some 1.5 million users of several dating/cheating websites and apps has been found to be accessible via the Internet. This information …

Yahoo! HQ
Yahoo scanned incoming emails on behalf of US intelligence

In 2015, Yahoo created custom software for covertly scanning their customers’ incoming emails, and deployed it on behalf of a US intelligence agency, Reuters reported on …

Facebook Messenger
Facebook Messenger end-to-end encryption rolled out for all users

Facebook Messenger’s Secret Conversations feature, which allows end-to-end encryption of messages exchanged by two users that have enabled the option, has finally been …

Samsung Knox
Samsung Knox flaws open unpatched devices to compromise

Researchers from Viral Security Group have discovered three vulnerabilities in Samsung Knox, a security platform that allows users to maintain separate identities for work and …

EU flag
EU wants to curb export of cyber-surveillance tech

The European Commission has proposed a new amendment to the regulation that forms the basis of EU’s export control regime of dual-use technology, i.e. technology that …

Windows Hello
Unlocking Windows 10 PCs with smartphones, wearables, smart cards

With Windows 10, Microsoft is slowly moving towards removing passwords as the main authentication method for users to log in to their (locked) computers. Windows Hello, the …

Don't miss

Cybersecurity news