Please turn on your JavaScript for this page to function normally.
Theoretical computer science provides answers to data privacy problem

The promise of big data lies in researchers’ ability to mine massive datasets for insights that can save lives, improve services and inform our understanding of the …

Week in review: The price of the Internet of Things, YiSpecter hits non-jailbroken iOS devices, and the most secure Android smartphones

Here’s an overview of some of last week’s most interesting news and articles:The price of the Internet of Things will be a vague dread of a malicious …

LogMeIn to acquire LastPass for $125 million

LogMeIn has agreed to acquire LastPass, the popular single-sign-on (SSO) and password management service.Under the terms of the transaction, LogMeIn will pay $110 million in …

Apple boots some ad blockers from App Store to protect users’ privacy

Less than a month has passed since the release of iOS 9, with which Apple welcomed third-party ad blocking apps, and the company has removed some of them from the App …

Which Android smartphones are most secure?

87% of Android devices are vulnerable to attack by malicious apps and messages, a group of researchers from Cambridge University in England has revealed.For years now, they …

Attackers compromise Cisco Web VPNs to steal login credentials, backdoor target networks

Another Cisco product is being targeted by attackers looking for a permanent way into the computer networks and systems of various organizations, Volexity researchers …

Most are concerned about security of healthcare data

More than three-fourths (76 percent) of U.S. adults are concerned that their healthcare records are vulnerable to hackers, according to the University of Phoenix.Perhaps not …

Top strategic IT predictions for 2016 and beyond

Gartner’s top predictions for 2016 look at the digital future, at an algorithmic and smart machine-driven world where people and machines must define harmonious …

CIOs agree, IT is more complex than ever

Nine out of ten UK CIOs (93%) believe that IT complexity has increased, according to Trustmarque. The research has revealed that cloud computing (66%), legacy technology (51%) …

New Toshiba CMOS image sensor improves recognition and authentication

In recent years, mobile devices have adopted user authentication systems to protect access and information security. Password entry remains the most common, but finger print …

Fake Android apps bypass Google Play store security

“ESET unveiled fake apps available at the official Google app store. Posing as popular game cheats, such as Cheats for Pou, Guide for SubWay and Cheats for SubWay, these …

Former journalist faces 25 years in prison for article defacement

Matthew Keys, a former Reuters social media editor, has been found guilty of computer hacking, and could be sentenced to spend as many as 25 years in prison.Keys was indicted …

Don't miss

Cybersecurity news