iOS app creates different personas on social networks
Have you ever decided not to post an update because you didn’t want your entire social network to be privy to every intimate detail of your life? Of course you have. …
Information Storage and Management
Information Storage and Management covers the components of a storage system and the different storage system models while also offering essential new material that explores …
Week in review: New cyber weapon Flame, gamers under attack, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, podcasts, videos, interviews and articles: Privacy trends affecting security In this podcast …
Ex MI5 chief gets her laptop stolen at airport
The former Director-General of UK’s internal security service MI5 has had her laptop stolen at London’s Heathrow airport on Tuesday. Dame Stella Rimington, who …
Privacy practices of the Internet’s biggest companies
When you use the Internet, you entrust your thoughts, experiences, locations, and more to companies like Google, Twitter, and Facebook. But what happens when the government …
IE10 will have “Do Not Track” on by default
As Microsoft released the preview of the next version of its Internet Explorer browser, news that in Windows 8 the browser will be sending a “Do Not Track” signal …
Spying version of Iranian anti-censorship software found
A compromised variant of Simurgh – a stand-alone proxy software for Microsoft Windows that has been heavily used by Iranians to get around censorship since 2009, and is …
Could security breaches cost lives?
Over a quarter of companies believe that if their sites go down or they suffer a major security breach it could potentially cost customers’ their lives, according to …
HTML5 browser-based, certificateless encryption platform
CertiVox launched the PrivateSky, a service that provides protection for messages, files and other information sent via the cloud through a two-factor authentication process …
Wireless Network Security A Beginner’s Guide
Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner’s Guide discusses the many attack vectors …
Is Flame something that we should worry about?
Much has been said and written in the last few days since the initial discovery of the so-called Flame (SkyWiper) toolkit. Security researchers have split in two camps: those …
Tiny but deadly banking Trojan discovered
The discovery of a new banking Trojan by the researchers working for CSIS Security Group has proved that a piece of malware doesn’t have to be big and complex to get the …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)