Please turn on your JavaScript for this page to function normally.
Privacy violations by popular mobile apps under investigation

An ongoing grand-jury investigation has revealed that many mobile applications could be sending various user information to advertising networks without the users’ …

The true scale of the insider threat

UK employees are likely to either maliciously or accidentally disclose confidential information about their employers to unauthorized personnel. A LogRhythm survey of 3000 UK …

BP loses laptop with personal data of 13,000 claimants

A laptop containing personal information of some 13,000 people who filed claims for compensation after last year’s big oil spill in the Gulf of Mexico has been lost, …

MySQL.com compromised by SQL injection attack

MySQL.com has been hacked and a part of the database containing member and employee email addresses, usernames and passwords has been published by the hackers on Pastebin.com. …

Second hand phones contain extensive personal data

People are unsuspectingly selling their personal information to complete strangers as a new report from CPP finds half (54%) of second hand mobile phones contain extensive …

Etsy privacy changes leave a lot to be desired

The Internet was all abuzz yesterday about Etsy’s privacy snafu that made its buyer’s full names and purchase histories available for everyone to see. Anyone who …

Etsy privacy blunder makes buyers’ purchases public

Etsy, the popular online market for small scale artisans and crafters, might be on the right track for a future privacy lawsuit following last week’s unveiling of its …

Anonymous leaks incriminating Bank of America e-mails

The big news today is that Anonymous – the hacktivist group known for its DDoS attacks and support for WikiLeaks – has rendered public a collection of e-mails it …

Restrictive e-mail policies: Hidden security risks for business

IT departments are fighting a losing battle in seeking to constrain employees’ behavior through policy alone, according to Mimecast. Findings suggest that a new approach …

The importance of metadata to prevent data leaks

A new IDC report highlights how the widespread use of collaborative content technologies is fueling the aggressive growth of unstructured and semi-structured data. While …

HBGary e-mails are a treasure trove for social engineers

The recent publication of the second batch of corporate e-mails exchanged between HBGary and HBGary Federal executives and various contacts in US intelligence, military and …

iPhones and iPads reveal passwords regardless of passcode protection

Losing your iPhone or iPad equals having your passwords compromised – even if the device is protected with a passcode. The results of an experiment conducted by Jens …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools