Please turn on your JavaScript for this page to function normally.
Mobile screen-spy software recreates passwords

When one types text messages, emails and login credentials on one’s virtual iPhone or Android keyboard, larger bubbles containing each character pop up for a second …

Carbonite privacy blunder results in spam

Popular online backup service Carbonite has made another privacy misstep. Computerworld blogger Richi Jennings, a self styled “anti-spam wonk”, has discovered that …

Americans will sue if personal data is compromised

Americans will go to great lengths to avoid identity theft, and many say they would take legal action against government or private organizations that compromise their …

Secure replacement for the Certificate Authority System

Convergence is a secure replacement for the Certificate Authority System. Rather than employing a traditionally hard-coded list of immutable CAs, Convergence allows you to …

Irresponsible IT disposal methods

Although data security is the primary concern when decommissioning IT equipment, only 61 per cent of companies currently data wipe all of their redundant computers, according …

180,000 Swedes at risk following password-hacking spree

Registered members of around 60 popular Swedish websites are in danger of having their stolen login credentials misused by cyber crooks in the wake of the biggest ever …

Personal info of 9 million Israelis stolen, available online

Personal information of some 9 million Israelis (alive and deceased) has been stolen by a contractor working for the country’s Ministry of Labor and Welfare with the …

Anonymous shuts down child porn sites, leaks usernames

Hacktivist group Anonymous has started a new campaign. Dubbed “Operation Darknet”, it aims to battle child pornography and ISPs that knowingly support and allow …

Consumers increasingly savvy about being online

Online consumers are increasingly savvy about being online, but many still do not employ all of the right tools to protect their privacy according to Anonymizer. While nearly …

Skype can be used to tie users to illegal download activity

A team of researchers has proved that it is possible to determine the IP address of a user and tie it with his Internet use, and even correlate this information to his …

Anonymous proxy for iPhone and iPad

NetShade makes your web presence anonymous by routing your connection through a proxy server. NetShade is a subscription service. With an account, you can use the five …

Divorce is less stressful than safeguarding confidential data

How are IT managers coping with today’s threat landscape? Are they properly protected against the latest data-stealing malware? And would employees report if they …

Don't miss

Cybersecurity news