Signal for Android finally out, offers end-to-end encrypted calls and messages
Open Whisper Systems (formerly Whisper Systems) has finally released the Android version of its popular free, open source iOS app for end-to-end encrypted voice calls.Signal …
Nearly 2,000 Vodafone UK customers’ accounts compromised, blocked
Customers of another UK telecom have had their information compromised by hackers, as Vodafone has explained that it was “subject to an attempt to access some customers’ …
TalkTalk breach: Third arrest, data already for sale, criminals targeting pensioners
News about the TalkTalk breach and the investigation of it are coming fast and thick. After the arrests of two teens (one in Northern Ireland, the other from Feltham) believed …
US DOJ admits that Stingrays can be used to intercept call and SMS content
After a battling the US Department of Justice in a court for two and a half years, the American Civil Liberties Union of Northern California has emerged victorious and has …
Real-world roadblocks to implementing CISA
The recent approval of CISA (the Cybersecurity Information Sharing Act) by the US Congress and Senate is paving the way for broader security collaboration. There is a rapidly …
European Parliament members want member states to protect Edward Snowden
Too little has been done to safeguard citizens’ fundamental rights following revelations of electronic mass surveillance, members of the European Parliament have stated …
Hackers put up for sale 13 million plaintext passwords stolen from 000webhost
000webhost, a popular free web hosting service, has suffered a data breach that resulted in the compromise of the name, email address and plaintext password of some 13 million …
Most are unaware of the seriousness of medical data theft
Most remain unaware of their vulnerability to medical data theft, and the fact that it can be far more damaging than credit card or social security number compromise, …
The security community’s reaction as CISA passes US Senate
On Tuesday, the US Senate has passed the Cybersecurity Information Sharing Act (CISA), a legislation that will allow companies to share information about the cyber attacks …
How can we decide on surveillance and privacy when we can’t see the whole picture?
“The surveillance of communications faces a legitimization crisis,” says James Losey, a fellow with the Open Technology Institute, the technology program of the …
WhatsApp collects phone numbers, call duration, and more!
A recent network forensic examination of popular messaging service WhatsApp is offering new details on the data that can be collected from the app’s network from its new …
Data of 4 million TalkTalk customers likely stolen in wake of website attack
TalkTalk, one of UK’s biggest telecoms, has suffered a “significant and sustained cyberattack” on their website, and it’s possible that personal and …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits