Please turn on your JavaScript for this page to function normally.
Google ups (some) bug bounties

Google has once again decided to raise the sums that researchers can earn by offering information about bugs in the company’s web services and properties (YouTube, …

Pirate Bay founder suspected of hacking police databases

Pirate Bay co-founder Gottfrid Svartholm, who has been extradited from Cambodia to Sweden to answer for allegedly hacking of Swedish IT company Logica and the Nordea bank …

NSA has direct access to Google, Facebook, Apple servers

After yesterday’s news that Verizon is compelled to share all phone call metadata with the NSA on a daily basis comes the incendiary revelation that the spy agency has …

U.S. Veterans Affairs Dept. repeatedly targeted by foreign hackers

Conflicting claims were heard at Tuesday’s hearing of the House Veterans’ Affairs oversight and investigations subcommittee, leaving open the question on whether …

Smart TVs vulnerable to a host of attacks

Smart (connected) TVs are becoming a common fixture in Western world homes, and most users consider it a handy tool and an improvement over the basic television sets of …

NSA legally forces Verizon to hand over all phone records on a daily basis

An order issued by the secret Foreign Intelligence Surveillance Court (FISC) that compels Verizon to share metadata on all the phone calls its users make with the NSA has been …

Fake Mt. Gox pages aim to infect Bitcoin users

Mt. Gox is the the largest Bitcoin exchange in the world, and as such it and its users are being repeatedly targeted by attackers. Some two months ago, it battled a massive …

Google researcher publishes Windows 0-day exploit

Less than two weeks after Google researcher Tavis Ormandy released information about a new Windows zero-day vulnerability on the Full Disclosure mailing list and asked for …

Bad Data Handbook

The Bad Data Handbook is a collection of experiences of 19 different data scientists and experts, who share their methods of making data work for and not against them.

Windows 8.1 will allow locking folders with a finger

Windows 8.1 is scheduled to be released at the end of 2013, and among the various changes that Microsoft aims to implement in it is native support for fingerprint readers, so …

Internet-savvy Turkish protesters turn to anti-censorship apps

In the months leading up to the current protests in Turkey, its government has been censoring content on Twitter and Facebook, as well as throttling and blocking access to …

Spyware sold to foreign governments aimed at U.S. woman critical of Turkish movement

A failed phishing attempt aimed at an unnamed woman openly critical of the G??len Movement has revealed that spyware created for lawful intercept purposes is being used for …

Don't miss

Cybersecurity news