Fear of data sharing on the rise
U.S. consumer attitudes and behavior related both to data sharing and social media oversharing have shifted significantly just within the last two years, according to a new …
What healthcare security and privacy pros wish for
2013 proved to be a dizzying year for healthcare compliance, privacy, and information security: the Affordable Care Act, enforcement of the HIPAA Omnibus Final Rule, and …
Multi-protocol SoftEther VPN becomes open source
In March 2013, a Japanese student by the name of Daiyuu Nobori set up VPN Gate, a free VPN service that he hoped would be used by Internet users who wish to avoid their …
4.6M Snapchat users’ info compromised in breach
It took just a week for someone to take advantage of the full disclosure of several (at the time) unpatched Snapchat vulnerabilities, and the result is a published list of 4.6 …
How have consumer attitudes changed towards data security?
Over the last few years, data has become non-exclusive; with the information consumers create and leave behind now the stuff of headlines and documentaries. From swiping a …
BitTorrent introduces secure, serverless messaging system
Back in September, the company behind the BitTorrent P2P protocol and the BitTorrent and μTorrent file-sharing software announced that they have started working on …
MacBook webcam indicator light can be disabled to aid spying
Two researchers from Johns Hopkins University have proved, without a doubt, that it is possible to activate internal iSight webcams included in some legacy Apple machines …
Obama panel advises big changes to NSA surveillance practices
The “independent” Review Group on Intelligence and Communications Technologies ordered to be created by US president Barack Obama in August has finally delivered …
Lead MEP presents preliminary conclusions on NSA inquiry
The European Parliament should consent to a trade deal with the US only if it makes no reference to data protection, says its Civil Liberties Committee in the preliminary …
NSA can easily decrypt private cell calls
A document from the seemingly inexhaustible trove delivered by former NSA contractor Edward Snowden shows that the NSA can easily break the old and weak algorithm still used …
Security implications of Google’s decision to display images in Gmail by default
This Thursday, Google announced that it will, once again, be displaying attached images in emails sent to Gmail users by default. Years back, Google decided to stop doing just …
One in four UK consumers have had online accounts hacked
As user engagement with ecommerce sites and online services inevitably increases in the run up to Christmas, almost a quarter (24 per cent) of UK consumers have had their …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade