Review: Securing the Internet of Things
About the authors Shancang Li is a senior lecturer in the cyber security research unit, Department of Computer Science and Creative Technologies at University of the West of …
Third party trackers on web shops can identify users behind Bitcoin transactions
More and more shopping Web sites accept cryptocurrencies as a method of payment, but users should be aware that these transactions can be used to deanonymize them – even …
The human point: Gaining visibility into the context behind user actions
In this podcast recorded at Black Hat USA 2017, Dr. Richard Ford, Chief Scientist at Forcepoint, talks about the security industry’s need of a paradigm shift toward …
DOJ wants to know who visited anti-Trump website
The US Department of Justice wants DreamHost to hand over IP addresses of some 1.3 million visitors to disruptj20.org, a website that helped organize political protests during …
Uber to get privacy audit every two years
Uber has agreed to implement a comprehensive privacy program and obtain regular, independent audits to settle Federal Trade Commission charges that they deceived consumers by …
New UK data protection law to offer more control to users
UK citizens will have more control over how their personal information is used by businesses, and the right to demand from social media companies and online traders the …
Only 2% of “GDPR-ready” organizations are actually compliant
Only nine percent of UK organizations that believe they are prepared for the General Data Protection Regulation (GDPR) actually are, new research from Veritas has found. In …
Think twice before buying a smart toy for your child
For a while now, security researchers have been warning about the security and privacy dangers of many popular “smart” toys. While consumer protection …
US Border Patrol isn’t allowed to search travelers’ data stored in the cloud
When searching travelers’ mobile phones at the border, US Customs and Border Protection (CBP) officers do not have the authority to rifle through data stored solely on …
Exposed Verizon customer data could be a shortcut for hijacking many online accounts
Chris Vickery, director of cyber risk research at UpGuard, has discovered more sensitive information exposed on an unprotected “bucket” on an Amazon AWS server. …
Telecoms don’t protect users from government overreach
The data stored on our mobile phones, laptops, and especially our online services can, when aggregated, paint a detailed picture of our lives—where we go, who we see, what we …
UK executives badly informed about where data is stored compared to other countries
When it comes to data compliance matters, one in five business decision makers within the UK admit they do not know which compliance regulations their company is subject to, …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd