Please turn on your JavaScript for this page to function normally.
iPhone data harvesting from non-jailbroken devices

Nicholas Seriot, a HES software engineer and iPhone developer and trainer held a presentation 2 days ago in Geneva. The subject of the talk was iPhone privacy. He demonstrated …

Feds sued for withholding social network surveillance info

The Electronic Frontier Foundation, an international non-profit organization that is dedicated to the preservation of civil liberties related to the use of the Internet and …

Handing your encryption key to authorities: US vs. UK law

Two years ago, a US federal judge decreed that a criminal defendant can’t be coerced into giving up the encryption key to his encrypted hard drive because that would …

Wall Street Journal website vulnerable to SQL injection

A Romanian security researcher that goes by the handle “Unu” has made public his latest conquest. He managed to gain access to databases of the The Wall Street …

Facebook privacy changes

Facebook CEO Mark Zuckerberg addressed Facebook users via an open letter today, and announced a few changes aimed at improving the privacy settings and allow users more …

Privacy in the spotlight: 8 million reasons

There is an all-around media frenzy going on about the 8 million GPS location requests that Sprint Nextel received and automatically granted through a web portal to law …

Espionage 2.5.4

Espionage is a discreet tool that integrates seamlessly with Apple's Finder, and its main "reason of being" is to protect individual folders and applications by encrypting its …

Spam ring leader fined $16 million

Lance Atkinson, the Australia-based New Zealander that has been found guilty of organizing a spam ring along with American accomplice Jody Smith, has been fined with more that …

FreeBSD bug grants root access to unprivileged users

A FreeBSD exploit that grants OS root access to unprivileged users was published yesterday on the Full Disclosure mailing list by Nikolaos Rangos, a German researcher that has …

Scam victim psychology: What makes you vulnerable?

“Understanding scam victims: seven principles for systems security” is a paper by Frank Stajano, an associate professor with the Computer Laboratory of the …

Clientless SSL VPN products break browser security mechanisms

Clientless SSL VPN products from multiple vendors put users at risk of a variety of web-based attacks because they “break fundamental browser security mechanisms”. …

Bit.ly steps up security

Bit.ly, one of the most popular URL shortening services, announced it will be integrating three new security-related services by the end of the year: 1. Websense’s …

Don't miss

Cybersecurity news