Please turn on your JavaScript for this page to function normally.
Smartwatch
Your smartwatch can give away your payment card’s PIN code

Smartwatches can be a perfectly useful and handy wearable device for some users, but it’s good to keep in mind that using them might mean opening yourself to an …

EU flag
European data centre services provider Interxion suffers breach

A vulnerability present in the customer relationship management (CRM) system of Interxion, a Netherlands-based provider of carrier and cloud-neutral colocation data centre …

Red door
Most IT pros oppose government backdoor access

Close to two-thirds of global IT professionals oppose giving governments backdoor access to encrypted information systems, and 59% feel that privacy is being compromised in an …

math
Imperfect algorithms threaten democracy

Do we want algorithms that we can’t understand or question to influence how we get to live our lives? Unfortunately, as Cathy O’Neil, well-known mathematician and …

FBI
FBI warns Time Warner Cable of potential data breach

Time Warner Cable will soon be contacting approximately 320,000 of its customers whose accounts have likely been compromised, the company’s public relations director …

Privacy
Consumers expect businesses to be more transparent on how their data is used

A global study of consumers reveals 48% are suspicious about how companies use their data. Based on a poll of more than 18,000 consumers across nine countries, the research …

Heartbeat
When hacking saves lives: Hacking medical devices and implants

Of all the IoT devices out there, none are more crucial to users than the medical devices that help them simplify the management of certain medical conditions or, in the most …

code
De-anonymizing code authors by analyzing executable binaries

A group of researchers that have previously proven that it’s possible to de-anonymize programmers by analysing the source code of programs they have created, have now …

Cisco Jabber
Cisco Jabber flaw allows MitM attackers to wiretap communications

A vulnerability in Cisco’s Jabber client for Windows can be exploited by attackers to wiretap communications, steal user credentials, and to tamper with messages sent …

Tor project
The Tor Project announces bug bounty program

Representatives of the Tor Project, the non-profit organization that maintains the software needed for using the Tor anonymity network and operates the Onion network, have …

Healthcare
Stolen medical information affects 18 out of 20 industries

Stolen medical information is a much more widespread issue than previously thought, affecting 18 out of 20 industries examined, according to the just released Verizon 2015 …

EU flag
New EU rules on data protection put the citizen back in the driving seat

New EU data protection legislation, informally agreed on Tuesday and backed by Civil Liberties MEPs on Thursday morning, will create a uniform set of rules across the EU fit …

Don't miss

Cybersecurity news