Leaked Hacking Team emails show Saudi Arabia wanted to buy the company
Emails stolen in the Hacking Team breach and leaked online by the still unknown attackers continue to be analyzed, and offer insight into the inner workings and controversial …
Silent Circle launches Blackphone 2, delivering business and personal privacy
Silent Circle has launched Blackphone 2 – its next-generation smartphone that delivers privacy and security. It provides full device encryption by default through harnessing …
The number of fingerprints stolen in OPM hack rose to 5.6 million
Once again, the scope of the breach at the US Office of Personnel Management has been amended: OPM’s press secretary Sam Schumach announced on Wednesday that “of …
Facebook tries to help advertisers and users with new ad control options
The ads you see on Facebook are set to become even more targeted, as the social network’s interest-based advertising, which they have been rolling out for the past year, …
AVG will sell user browsing and search info to advertisers
Starting on October 15, when its new privacy policy comes into effect, Czech AV maker AVG will start selling user activity information to online advertisers.“We do not, …
26 vulnerabilities found in parental monitoring application
A new Citizen Lab report details results of two independent audits of the privacy and security of Smart Sheriff, a parental monitoring application that has been promoted by …
Privacy International helps individuals find out if they were spied on by the GCHQ
Continuing with its “Did GCHQ Illegally Spy On You?” campaign, Privacy International has set up a website with instructions for individuals and organizations on how to …
63% in favor of encryption backdoors to respond to national security threats
Vormetric did a survey on how Americans view “backdoor” access by government entities to the encrypted data of private businesses. Ninety-one percent recognized …
How talking to recognition technologies will change us
Ernest Hemmingway once said, “I have learned a great deal from listening carefully. Most people never listen.” Perhaps, like most of the things we do, technology will absolve …
Android ransomware masquerades as Adult Player app, takes photo of victim
“A new mobile ransomware variant uses a clever new technique to push affected users to pay the asked-for ransom: it takes a photo of the user with the phone’s …
Fake recruiters on LinkedIn are targeting infosec pros
“There’s a group of fake recruiters on LinkedIn mapping infosec people’s networks. Not sure what their goal is yet, just a heads-up to others,” …
Ashley Madison-themed blackmail, data deletion scams hitting inboxes
In the wake of the Ashley Madison hack and consequent data leaks, blackmailers and scammers are doing their best to extract as much money and information as it’s …