Please turn on your JavaScript for this page to function normally.
Belgacom shares more details about alleged GCHQ breach

Late last year, documents from Edward Snowden’s NSA trove have revealed that Britain’s GCHQ has allegedly mounted a successful attack against primarily state-owned …

Cyber security coalition reports on Chinese state-sponsored espionage

Novetta Solutions released multiple reports, the main one being titled “Operation SMN: Axiom Threat Actor Group Report”, which details the characteristics of a …

Code Red: A global initiative for fighting government surveillance

Well known and widely respected privacy expert and advocate Simon Davies has announced the creation of a new global initiative that’s aimed at supporting the world-wide …

The Software Assurance Marketplace: A response to a challenging problem

With the steady proliferation of wearable devices and the emergence of the Internet of Things, everyone and everything will eventually be connected by some piece of software. …

Local US cops distributing questionable, unsafe spyware to families

A few days after the creator of the StealthGenie application has been indicted in what is the first-ever criminal case concerning the advertisement and sale of a mobile device …

California toughens breach notification law

California Governor Edmund Brown has signed on Tuesday new legislation that will strengthen privacy and consumer protections in the state. The new set of bills will, among …

FBI will share its Malware Investigator portal with businesses

The US Federal Bureau of Investigation has announced that its internal Malware Investigator portal – previously available only to law enforcement and government entities …

The Crime-as-a-Service business model

A service-based criminal industry is developing, in which specialists in the virtual underground economy develop products and services for use by other criminals. This …

Federal regulations on cyber security lead to revenue loss

Even though 87 percent those surveyed in the financial service industry agree that current regulatory changes are very important or critical to keeping their companies and …

Apple drops the “warrant canary” from transparency report

In the wake of the change of Apple’s Privacy Policy, and the encryption technology used in iOS 8 that makes it “not technically feasible” for Apple to …

With iOS 8, Apple won’t be able to unlock phones for the police

With the release of iOS 8, Apple has also updated its Privacy Policy. “The changes were made predominantly to cover new features in iOS 8, or to provide additional …

Hackers penetrated systems of key defense contractors

Hackers associated with the Chinese government successfully penetrated the computer systems of U.S. Transportation Command contractors at least 20 times in a single year, …

Don't miss

Cybersecurity news