Please turn on your JavaScript for this page to function normally.
Yahoo
How to close your Yahoo account

In light of the recent massive Yahoo breach an the fact that Yahoo scanned incoming emails on behalf of US intelligence, many are opting to close their accounts to protect …

Yahoo! HQ
Yahoo scanned incoming emails on behalf of US intelligence

In 2015, Yahoo created custom software for covertly scanning their customers’ incoming emails, and deployed it on behalf of a US intelligence agency, Reuters reported on …

DDoS
53% of DDoS attacks result in additional compromise

DDoS attack volume has remained consistently high and these attacks cause real damage to organizations, according to Neustar. The global response also affirms the prevalent …

IoT security
Checklist: IoT security and privacy

The Online Trust Alliance (OTA) released the consumer IoT security and privacy checklist, which contains steps consumers can take to help increase the security, privacy and …

Facebook Messenger
Facebook Messenger end-to-end encryption rolled out for all users

Facebook Messenger’s Secret Conversations feature, which allows end-to-end encryption of messages exchanged by two users that have enabled the option, has finally been …

Old people
Why the older generation is an attractive target for cybercriminals

People aged 55 and over are behaving insecurely online and often become the victim of fraud, according to Kaspersky Lab and B2B International. The survey questioned 12,546 …

abstract
Big Data investments are up, but fewer organizations plan to invest

Big Data investments continue to rise but are showing signs of contracting, according to Gartner. Their survey revealed that 48 percent of companies have invested in Big Data …

open source
OpenChain Project: Best practices for an ecosystem of open source software compliance

Yesterday at LinuxCon in Berlin, The Linux Foundation announced that the OpenChain Project has established its first set of requirements and best practices for consistent free …

Samsung Knox
Samsung Knox flaws open unpatched devices to compromise

Researchers from Viral Security Group have discovered three vulnerabilities in Samsung Knox, a security platform that allows users to maintain separate identities for work and …

EU flag
EU wants to curb export of cyber-surveillance tech

The European Commission has proposed a new amendment to the regulation that forms the basis of EU’s export control regime of dual-use technology, i.e. technology that …

Cloud
Cloud providers not expanding security as fast as customers adopt cloud

Information security professionals trust the cloud even less now than they did last year, despite efforts by cloud-service providers to tighten security, according to the SANS …

Windows Hello
Unlocking Windows 10 PCs with smartphones, wearables, smart cards

With Windows 10, Microsoft is slowly moving towards removing passwords as the main authentication method for users to log in to their (locked) computers. Windows Hello, the …

Don't miss

Cybersecurity news