Please turn on your JavaScript for this page to function normally.
Tor Cloud project reaches the end of the line

The Tor Project has discontinued the Tor Cloud project due to a lack of dedicated software developers and maintainers.The Tor Cloud project was started in late 2011, with the …

Truth
Do you know where your sensitive data lives?

The majority of IT security professionals don’t have full visibility into where all their organization’s sensitive data resides, according to Perspecsys. Challenges with …

Flawed crypto endangers millions of smart grid devices

The cryptography used in the Open Smart Grid Protocol (OSGP), one of the most widely used smart meter and smart grid device networking standards, can be easily cracked, …

Data privacy endangered by international trade agreements

You might or might not know that some countries – especially some European ones – have (or are working on) strong data protection laws.What most people don’t …

Week in review: Illegal surveillance, WordPress insecurity, cheap computer kill switch

Here’s an overview of some of last week’s most interesting news, podcasts and articles:Securing the smart grid: European Network of Cyber SecurityDr. Klaus Kursawe …

Breaking Bad-themed ransomware targeting users

“A new type of ransomware is targeting Australian users, and its creators have decided to have some fun and express their love for the popular US TV show Breaking Bad …

Court declares NSA’s domestic phone metadata collection program illegal

It took nearly two years, but three judges of a federal appeals court in New York have unanimously ruled that the bulk collection of telephone metadata associated with phone …

To what extent companies digitally track our daily lives?

Do you know how digitally collected information uncovers things about you which you would rather remained private? We’re already living in the age of Big Data, and are …

BalaBit updates Shell Control Box

BalaBit announced Shell Control Box (SCB) 4 F1, an enterprise-level activity monitoring appliance that controls privileged access to remote IT systems, records activities in …

Risk IT and services spending to reach $78.6 Billion in 2015

According to a new IDC Financial Insights forecast, worldwide risk information technologies and services (RITS) spending will reach $78.6 billion in 2015 and is expected to …

GPU-based malware is real, say developers of PoC rootkit and keylogger

“Two yet unfinished coding projects by a group of developers that call themselves Team Jellyfish have received unexpected attention due to an Ars Technica article …

Casino installs new POS equipment while investigating potential data breach

A few days after Las Vegas’ Hard Rock casino revealed that it has been hit by carders, another US casino has started an internal investigation aimed at finding out …

Don't miss

Cybersecurity news