Please turn on your JavaScript for this page to function normally.
Microsoft refuses to hand over emails stored in Ireland, held in contempt by judge

Microsoft has urged US District Judge Loretta Preska, the judge presiding over the case that sees the company refusing to hand some emails stored in its Dublin facility over …

Phishers resort to AES crypto to obfuscate phishing sites

Phishers have started employing AES encryption to disguise the real nature of phishing sites from automatic phishing detection tools. This is the latest obfuscating trick in …

DARPA is after vulnerabilities in algorithms implemented in software

The Defense Advanced Research Projects Agency (DARPA) is looking for new program analysis techniques and tools to enable analysts to identify vulnerabilities in algorithms …

Home Depot breach confirmed, stolen info used to change PINs, collect money

In a terse statement, and an annoyingly repetitive FAQ, Home Depot has confirmed that it had suffered a breach of its payment data systems. The breach could impact any …

FBI’s account of locating Silk Road’s server disputed by researchers

The US government’s explanation of how it managed to discover the location of the servers hosting Silk Road, the infamous online black market, is being disputed by a …

Blackphone security issues and vulnerabilities unveiled

Blackphone, the carrier- and vendor-independent smartphone that was created with the goal of placing privacy and control directly in the hands of its users, is not without its …

Salesforce users hit with malware-based targeted attack

Late last Friday, global cloud-based CRM provider Salesforce has sent out a warning to its account administrators about its customers being targeted by the Dyreza malware. …

Review your Facebook privacy settings with Privacy Checkup

Facebook’s Privacy Checkup tool – informally dubbed “Privacy Dinosaur” – has been made available for use to all users of the popular social …

Google will start gradually sunsetting SHA-1

Google has announced that it will begin the process of gradually sunsetting SHA-1 (as used in certificate signatures for HTTPS) with Chrome 39, which is due to be released in …

Researchers compile list of Android apps that allow MitM attacks

Around 350 Android apps that can be downloaded from Google Play and Amazon stores fail to properly validate SSL certificates for HTTPS connections, and thus open users to …

Coursera privacy issues exposed

When well-known lawyer and Stanford law lecturer Jonathan Mayer was invited to teach a course on government surveillance on Coursera, the popular online website offering free …

HealthCare.gov breach affected test server, not users

A server within the Healthcare.gov system has been compromised, but the good news is that it didn’t contain consumer personal information. It was just a development …

Don't miss

Cybersecurity news