Please turn on your JavaScript for this page to function normally.
Data visualization of global DDoS attacks

Arbor Networks have collaborated with Google Ideas to create a data visualization that maps global DDoS attacks. Google Ideas – a “think/do’ tank – …

Google offers rewards for code improvements to open source programs

Google has announced that they plan to reward researchers who aim to “improve the security of key third-party software critical to the health of the entire …

NSA impersonated Google in MitM attacks

After all the recent revelations about the NSA and their surveillance and encryption-foiling activities, would it surprise you to know that the agency or its British …

Bogus hacking Android apps offered on Google Play

Getting your Android apps from Google Play is always a better bet than picking them up from third party online marketplaces, but you also can’t be completely sure you …

Fake AVG AV apps offered on Google Play

However hard Google works to prevent malicious apps from being offered on Google Play, its official online Android market, some always get through. AVG researchers warn about …

Microsoft and Google continue to press US government over transparency

Brad Smith, Microsoft’s general counsel, announced that Google and Microsoft are tired of waiting for the US government to allow them to publish sufficient data relating …

Fake “Secure Document” notice will compromise your email account

Phishers have lately shown a penchant for using the “secure / confidential document / message” lure for making users share their login credentials. The latest …

Poorly redacted court filing reveals Google contested NSL gag order

A court filing that has been improperly redacted and has recently been made public by the US Department of Justice shows that Google asked a US court to remove the gag order …

Social networks: Can robots violate user privacy?

High-Tech Bridge decided to conduct a simple technical experiment to verify how the 50 largest social networks, web services and free emails systems respect – or indeed …

The erosion of privacy in the digital world

Yves Le Roux is the Technology Strategist at CA Technologies and Chair of ISACA’s Data Privacy Task Force. In this interview he discusses the evolution of the digital …

Chrome plugin aims to thwart user profiling efforts

Inspired by a piece of fictional software described in Cory Doctorow’s book Little Brother, developer Ben West created a browser plugin that should, in theory, make it …

Cyber crooks misuse Google service to control Android Trojans

Cybercriminals have been spotted using a novel method of controlling Android mobile malware: a legitimate service called Google Cloud Messaging. GCM has been created to allow …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools