Is Flame something that we should worry about?
Much has been said and written in the last few days since the initial discovery of the so-called Flame (SkyWiper) toolkit. Security researchers have split in two camps: those …
When syncing sinks your browser
Google Chrome’s most recent version (v19) introduced a “tab sync” feature. When inspecting this feature from a security perspective we realized that a new …
Cybercrime goes mobile
Corporate espionage has never been so easy. See how a simple app can transform your smartphone into an espionage tool in the hands of criminals, able to record your …
UFED Touch: Field-ready mobile forensics solution
Cellebrite launched UFED Touch, a solution for investigators to extract and decode digital evidence from mobile devices including smartphones, legacy phones, portable GPSs and …
Dissecting modern privacy concerns
In this interview, Al Raymond, VP of Privacy & Records Management at ARAMARK Corporation, discusses the nature of identity in a digital society, the implications of over …
Privacy trends affecting security
In this podcast recorded at the RSA Conference 2012, Gant Redmon, VP of Business Development and General Counsel at Co3 Systems, talks about future privacy laws and trends …
Will the new EU privacy legislation secure Europe’s digital economy?
At the start of 2012, the European Commission announced it is to undertake a comprehensive review of the EU’s 1995 data protection rules. Its aim is to strengthen online …
SMS spying app offered on Google Play
Phone spying apps are usually offered on hacking forums and third party app markets, but given their malicious potential, it’s unusual to see them being offered for sale …
Organizations struggling to enforce policies for managing records
Despite greater investments in their information management programs, most organizations still struggle with properly implementing those programs and getting employees to …
Fake Amex ID verification email leads to malware
A bogus American Express account ID verification email is currently doing rounds, trying to trick users into following the offered links: The email might look like a phishing …
Twitter supports “Do Not Track” option
The news was announced by Ed Felten, the US Federal Trade Commission’s CTO, at a New York Internet Week privacy panel, and Twitter has quickly come out to confirm it: …
Most CCTV systems are easily accessible to attackers
The use of CCTV cameras for physical surveillance of all kinds of environments has become so pervasive that most of us don’t give the devices a second thought anymore. …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics