Please turn on your JavaScript for this page to function normally.
Researcher refuses to help Saudi telco to spy on people

You would think that a Saudi Arabian telecom firm interested in monitoring its users’ mobile communications would not be asking a well-known pro-privacy researcher such …

Fraudster who hired hackers to manipulate stock prices goes to prison

The central organizer of a worldwide conspiracy to manipulate stock prices through a “botnet” network of virus-controlled computers was sentenced today to 71 …

Internet Explorer best at blocking malware

NSS Labs released the results and analysis from its web browser security comparative evaluating the protection offered by five browsers – Safari 5, Chrome 25/26, …

U.S. govt secretly obtains AP phone records

A letter received by the Associated Press’ general counsel has revealed that the DOJ has successfully subpoenaed two months’ worth of telephone toll records for …

McAfee launches security service with facial and voice recognition

McAfee announced McAfee LiveSafe, an unlimited cross-device security service that uses facial and voice recognition technology to protect users’ digital lives. The …

Should the G20 forum discuss Internet security?

The G20 should tackle the vastly important issue of Internet security and “articulate a vision for shaping the Internet economy for the next five to 10 years,” a …

GFI MailArchiver 2013 released

GFI Software announced a new version of its email archiving solution, GFI MailArchiver, which now provides managers with the ability to better understand employee email habits …

The top three threats facing enterprises

Globalization and mobility are fueling opportunities for enterprises today, but they have a nemesis: amplification. As physical perimeters become flexible and the tools and …

How employees use business email

The conventional 9am-5pm working day and five-day working week is a thing of the past for the overwhelming majority of workers at SMBs, according to a new survey on …

Android malware continues to rise

The first quarter of 2013 was marked by firsts for Android malware that add complexity to the Android threat landscape. According to F-Secure Labs, January through March saw …

U.S. government tops list of malware buyers

While vocally and repeatedly tying all kinds of discovered cyber attacks to Chinese hackers, the U.S. has quietly been working on their own cyber offensive capabilities …

Malicious browser extensions are hijacking Facebook accounts

Facebook users – especially those in Brazil – are being targeted with malicious browser extensions trying to hijack Facebook profiles, warns Microsoft. So far, …

Don't miss

Cybersecurity news