Please turn on your JavaScript for this page to function normally.
Critical de-anonymization 0-days found in Tails

Tails, the security-focused Debian-based Linux distribution favoured by Edward Snowden, journalists and privacy-minded users around the world, sports a number of critical …

EFF releases Firefox, Chrome plugin to stop online tracking

The Electronic Frontier Foundation (EFF) has released a beta version of Privacy Badger, a browser extension for Firefox and Chrome that detects and blocks online advertising …

Metadata-hiding Dark Mail protocol soon to be reality

At the Hackers on Planet Earth X (HOPE X) conference held this weekend in New York, NSA whistleblower Edward Snowden called for hackers, coders and developers to “help …

TRUSTe launches new privacy assessments

TRUSTe expanded its Data Privacy Management Platform to include TRUSTed Assessments, a new privacy assessment solution which addresses the need for specialized tools to …

Breaches exposed 22.8 million personal records of New Yorkers

Attorney General Eric T. Schneiderman issued a new report examining the growing number, complexity, and costs of data breaches in the New York State. The report reveals that …

Keyloggers found at hotel business centers, US Secret Service warns

In the wake of the arrest of a group of people suspected of having compromised computers in hotel business centers in Texas, the US Secret Service and the DHS’s National …

IoT privacy tech working group announced

TRUSTe formed a multi-stakeholder IoT Privacy Tech Working Group to identify the technical standards and best practices necessary to help enhance consumer privacy in the …

Consumers don’t trust any industry with their personal data

U.S. consumers have little faith that companies are able to keep their person data safe. The sentiment crosses nearly all industries with consumers saying that the lack of …

DPAPI vulnerability allows intruders to decrypt personal data

Passcape Software has discovered a DPAPI vulnerability that could potentially lead to unauthorized decryption of personal data and passwords of interactive domain users. The …

Risks of selling used smartphones

AVAST Software easily retrieved personal data from used smartphones sold online, despite consumers deleting their data. From the used devices, researchers was able to recover …

Microsoft hardens encryption for Outlook, OneDrive

Microsoft is making good on the promises they made last December, when they announced that they will – among other things – strengthen the encryption of customer …

Cops must get a warrant before looking through cellphone content

The nine judges of the US Supreme Court have unanimously ruled that law enforcement officers can’t search the contents of an arrested individual’s cell phone(s) …

Don't miss

Cybersecurity news