Please turn on your JavaScript for this page to function normally.
Criminal attacks on healthcare increase 100 percent

As millions of new patients enter the U.S. healthcare system under the Affordable Care Act, patient records have become a smorgasbord for criminals. A new study on patient …

Head of Senate Intelligence Committee accuses CIA of spying on Senate

The long awaited reprimand of the US intelligence community by Senator Dianne Feinstein, the head of the Senate Intelligence Committee, happened yesterday, but not for the …

Facebook security and privacy pitfalls

In this interview, Andrei Serbanoiu, Online Threats Researcher at Bitdefender, discusses Facebook security and privacy pitfalls, the dangers of sharing on the social network, …

How do the top 100 UK ecommerce sites deal with personal data?

Dashlane assessed the password security procedures on the Top 100 e-commerce sites by examining 26 different password security criteria and awarding/docking points depending …

Do organizations care about data protection?

Most consumers just don’t believe that the personal and financial data they submit to corporations is safe. That’s the unmistakable takeaway from a new snap poll …

Pinterest publishes its first transparency report

Pinterest has joined the ranks of Internet companies who publish a bi-annual transparency report by issuing one covering the six months from July to December 2013. …

Video: Edward Snowden on privacy and technology

Edward Snowden speaks about privacy and technology with the ACLU’s Ben Wizner and Christopher Soghoian at SXSW Interactive.

50,000 Statista users affected by data breach

Customers of the biggest online statistics portal Statista are being notified that the company’s systems have been breached and the hackers likely made away with its …

Is your browser a user agent, or a double agent?

In this podcast recorded at RSA Conference 2014, Mike Shema, Director of Engineering at Qualys, discusses how privacy shouldn’t be an afterthought in the browser. Data …

Big Data security and privacy challenges

In this interview, Leighton Johnson, CTO, Senior Security Engineer for Information Security and Forensics Management Team (ISFMT), talks about how Big Data is transforming the …

Personal info of 12 million KT customers stolen and misused

Two men have been arrested in connection with the massive KT Corp. data breach that resulted in the theft of personal and financial information of some 12 million customers of …

HTTPS can’t be trusted to obscure private online activity

HTTPS was initially used to prove to Internet users that the website and web server with which they are communicating are indeed the ones they want to communicate with, but …

Don't miss

Cybersecurity news