Please turn on your JavaScript for this page to function normally.
iPhones are immune to FinSpy infections

FinSpyMobile, the mobile spying software sold by German company Gamma Group, can’t be installed on iPhones that have not been jailbroken, shows one of the documents …

Data breaches and high-risk vulnerabilities continue to dominate

Cyber threats, data breaches and high-risk vulnerabilities have continued to dominate the first half of 2014. The severity of these attacks intensified against financial and …

Blackphone rooted at DEF CON?

Blackphone, the recently released security-oriented smartphone, has apparently been rooted. The feat was executed at the DEF CON hacker conference, where Jon Sawyer …

Yahoo will offer end-to-end mail encryption by 2015

Since the beginning of this year, Yahoo has had several good news for its customers: Yahoo Mail got HTTPS on by default, and the company began encrypting all the traffic …

NIST asks for comments on security guide for federal information systems

The National Institute of Standards and Technology (NIST) has issued for public comment a draft update of its primary guide to assessing the security and privacy controls that …

Reactions to the Paddy Power data breach

Paddy Power is contacting 649,055 customers in relation to a data breach from 2010. The historical dataset contained individual customer’s name, username, address, email …

BitTorrent’s decentralized chat app keeps content, metadata safe

BitTorrent, the company that develops the eponymous peer-to-peer protocol and two popular clients that use it, has announced the release of Bleep, an online communication …

Free iPhone app for encrypted phone calls released

There is finally a free alternative for all iOS users who are looking to encrypt their voice calls: the app is called Signal, and has been developed by the Open Whisper …

375 million customer records compromised in 2014

Between April and June of this year, there were a total of 237 breaches that compromised more than 175 million customer records of personal and financial information …

Russian government offers money for Tor-cracking tech

The Russian Ministry of Internal Affairs (MVD) has published a tender offering $111,000 to any Russian company or organization that can provide technology that can …

What influences corporate security strategies?

Sixty eight percent of businesses stated that the NSA breach by Edward Snowden and the number of PoS system breaches in the past year were the most impactful in terms of …

Google and EU debate on implementation of “right to be forgotten”

It is, by now, widely known that European users can ask Google to “forget” sites with content these users find damaging to their reputation, but the European Court …

Don't miss

Cybersecurity news