Please turn on your JavaScript for this page to function normally.
face
Unregulated use of facial recognition tech threatens people’s privacy, civil rights

Facial recognition tech is a boon to law enforcement, but without strict regulation and safeguards, it poses considerable risks to the privacy, civil liberties, and civil …

vault
Four ways to keep data safe during election season

There is no shortage of passionate feelings among voters when it comes to this November’s presidential election. Those feelings extend tenfold to each candidate’s campaigns. …

Send selfies ID cards
Android banking Trojan asks victims to send selfies with ID cards

The Acecard Android Trojan is a threat that has been around for quite some time. Its main goal is to collect login credentials used by the victims to access their online …

Geofeedia
Twitter, Facebook revoke access to social media surveillance software used by cops

Geofeedia, a US-based company that offers its social media aggregation platform “to a broad range of private and public sector clients”, also numbers among its …

Signal disappearing messages
Signal users can now make their messages disappear

Open Whisper Systems’ Signal, the messaging app favoured by Edward Snowden and many other users who want and need to keep their communication safe and private, is now …

Lock
How much is your privacy worth?

How much is your privacy worth? Take for example your bank account number, sort code, name, and address. Is it worth more than £25? Well I think that it is and as a result I …

Yahoo
Yahoo security breach highlights the importance of personal protection

The recent breach at Yahoo has proved once again that, regardless of a company’s size and expertise, security is always an issue. In the wake of the incident which left …

Hook Up Dating app
Database containing info of 1.5 million online daters found leaking

Sensitive personal information of some 1.5 million users of several dating/cheating websites and apps has been found to be accessible via the Internet. This information …

Yahoo! HQ
Yahoo scanned incoming emails on behalf of US intelligence

In 2015, Yahoo created custom software for covertly scanning their customers’ incoming emails, and deployed it on behalf of a US intelligence agency, Reuters reported on …

mask
DefecTor: DNS-enhanced correlation attacks against Tor users

A group of researchers from Princeton University, Karlstad University and KTH Royal Institute of Technology have devised two new correlation attacks that can be leveraged to …

Yahoo
Yahoo breach was not state-sponsored, researchers claim

The massive 2014 Yahoo breach isn’t the work of state-sponsored hackers as the company has claimed to believe, say researchers from identity protection and threat …

Confide
Enhance iMessage security using Confide

One of the new features in iOS 10 offers the possibility of deploying specially crafted applications within iMessage. Most users will probably (ab)use this new functionality …

Don't miss

Cybersecurity news