Please turn on your JavaScript for this page to function normally.
Consumers confused about data breaches

A business’s ability to protect personal information and communicate the circumstances of a data breach can impact customer loyalty and an organization’s …

iOS app creates different personas on social networks

Have you ever decided not to post an update because you didn’t want your entire social network to be privy to every intimate detail of your life? Of course you have. …

Privacy practices of the Internet’s biggest companies

When you use the Internet, you entrust your thoughts, experiences, locations, and more to companies like Google, Twitter, and Facebook. But what happens when the government …

Gamers increasingly under attack

In this video, Christopher Boyd, Senior Threat Researcher at GFI Software, talks about how scammers increasingly target gamers and gaming databases because of valuable …

IE10 will have “Do Not Track” on by default

As Microsoft released the preview of the next version of its Internet Explorer browser, news that in Windows 8 the browser will be sending a “Do Not Track” signal …

Could security breaches cost lives?

Over a quarter of companies believe that if their sites go down or they suffer a major security breach it could potentially cost customers’ their lives, according to …

Is Flame something that we should worry about?

Much has been said and written in the last few days since the initial discovery of the so-called Flame (SkyWiper) toolkit. Security researchers have split in two camps: those …

When syncing sinks your browser

Google Chrome’s most recent version (v19) introduced a “tab sync” feature. When inspecting this feature from a security perspective we realized that a new …

Cybercrime goes mobile

Corporate espionage has never been so easy. See how a simple app can transform your smartphone into an espionage tool in the hands of criminals, able to record your …

UFED Touch: Field-ready mobile forensics solution

Cellebrite launched UFED Touch, a solution for investigators to extract and decode digital evidence from mobile devices including smartphones, legacy phones, portable GPSs and …

Dissecting modern privacy concerns

In this interview, Al Raymond, VP of Privacy & Records Management at ARAMARK Corporation, discusses the nature of identity in a digital society, the implications of over …

Privacy trends affecting security

In this podcast recorded at the RSA Conference 2012, Gant Redmon, VP of Business Development and General Counsel at Co3 Systems, talks about future privacy laws and trends …

Don't miss

Cybersecurity news