government

New UK data protection law to offer more control to users
UK citizens will have more control over how their personal information is used by businesses, and the right to demand from social media companies and online traders the …

US DOJ publishes guidelines for setting up a vulnerability disclosure program
Instituting a vulnerability disclosure program (aka bug bounty program) that won’t blow up in the organization’s face can be a daunting task. Some will prefer to …

US senators introduce bill to improve IoT security, protect researchers probing it
US Senators Mark Warner (D-VA), Cory Gardner (R-CO), Ron Wyden (D-WA) and Steve Daines (R-MT) introduced bipartisan legislation to improve the cybersecurity of …

Addressing the deficit in cyber security workforce and national policy
Whether they like it or not, in this day and age nearly all organizations have to think about their cybersecurity posture and find a way to minimize cybersecurity risk. But …

Facebook moderators can inspect private messages of users suspected of terror links
Pressured by European governments, Facebook, Twitter and Google are trying to tackle the extremist propaganda and recruitment on their social networks and sites. It’s an …

DHS to enforce extra security checks instead of airplane carry-on laptop ban
Travelers from all over the world who plan to fly into the US will be subjected to more rigorous security checks before being allowed to board the plane, the Department of …

Russia threatening to ban Telegram encrypted messaging app
Roskomnadzor, Russia’s communications regulator, is threatening to ban the use of popular encrypted messaging app Telegram. The request Roskomnadzor is a federal agency …

German law enforcement gets new hacking powers
On Thursday, the Bundestag has voted to accept a new amendment that will expand the German police’s hacking powers. The new amendment will allow them to use so-called …

How the CIA gained access to air-gapped computers
A new WikiLeaks release of documents believed to have been stolen from the CIA show the intelligence agency’s capability to infect air-gapped computers and networks via …

As UK govt calls for encryption backdoors, EU lawmakers propose a ban on them
As the UK gets hit by terror attacks one after the other, the government’s cry for making sure terrorists and criminals can’t find “safe spaces” online …

How the CIA hacked wireless home routers
For many years, the CIA has had the capability to compromise a wide range of commercial wireless routers, and to monitor, control and manipulate the traffic passing through …

Is Europe ready for GDPR?
What impact will GDPR have on businesses across the UK, France, Belgium and Luxemburg? Vanson Bourne surveyed 625 IT decision makers in four countries and found that the UK is …
Featured news
Resources
Don't miss
- Croatian research institute confirms ransomware attack via ToolShell vulnerabilities
- Microsoft fixes “BadSuccessor” Kerberos vulnerability (CVE-2025-53779)
- Fortinet warns about FortiSIEM vulnerability with in-the-wild exploit code (CVE-2025-25256)
- AWS CISO explains how cloud-native security scales with your business
- Product showcase: Apricorn Aegis NVX, a high-security, portable SSD