Please turn on your JavaScript for this page to function normally.
bald eagle
Is the Cybersecurity Act of 2015 effective?

While many are decrying the newly signed Cybersecurity Act of 2015 for its privacy issues, DB Networks is taking the Act to task for an equally troublesome reason: It is based …

Washington state sues iYogi tech support firm for scamming users

Washington State Attorney General Bob Ferguson announced a lawsuit against one of the biggest independent tech support providers in the world, iYogi, and its President, Vishal …

EU flag
New EU rules on data protection put the citizen back in the driving seat

New EU data protection legislation, informally agreed on Tuesday and backed by Civil Liberties MEPs on Thursday morning, will create a uniform set of rules across the EU fit …

First ever EU rules on cybersecurity

Transport and energy companies will have to ensure that the digital infrastructure that they use to deliver essential services, such as traffic control or electricity grid …

Revealed: What info the FBI can collect with a National Security Letter

After winning an eleven-year legal battle, Nicholas Merrill can finally tell the public how the FBI has secretly construed its authority to issue National Security Letters …

The current wave of data protection regulations and how it will affect the infosec industry

In 2016, the EU is set to review the next draft of The Network and Information Security (NIS) ‘cybersecurity’ directive which will bring new compliance requirements into …

FTC amends telemarketing rule to ban payment methods used by scammers

The Federal Trade Commission has approved final amendments to its Telemarketing Sales Rule (TSR), including a change that will help protect consumers from fraud by prohibiting …

The future of information security in the government

A new report from Intel Security and the Digital Government Security Forum (DGSF) looks at the fast changing digital world, which promises to transform how our government and …

Video: General Data Protection Regulation, Safe Harbor Agreement, Copyright reform and the Google case

After having been ruled invalid by the ECJ, the Safe Habor Agreement is now back in the spotlight as the Commission has finally issued a communication on the Trans-Atlantic …

Tor Project claims FBI paid university researchers $1m to unmask Tor users

Have Carnegie Mellon University researchers been paid by the FBI to unmask a subset of Tor users so that the agents could discover who operated Silk Road 2.0 and other …

Why governments need to take the lead in cybersecurity

Time and time again we hear people lament about the impact cybercrime has on our businesses, our individual lives, the economy, and on society. Report after report show the …

Three indicted in largest theft of customer data from a U.S. financial institution in history

On Tuesday, federal prosecutors unsealed a superseding indictment charging Gery Shalon, Joshua Samuel Aaron and Ziv Orenstein with orchestrating massive computer hacking …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools