Please turn on your JavaScript for this page to function normally.
Why cybercriminals want your personal data

Over the past few years, the personal data theft landscape has changed as online behaviors and activities evolve. Online shopping is more popular than ever, businesses are …

Top 12 scams of the holiday season

McAfee released its annual “12 Scams of Christmas” list to educate the public on the most common scams that criminals use during the holiday season to take …

GCHQ hacks GRX providers to mount MitM attacks on smartphone users

A new report by German Der Spiegel has revealed that the Government Communications Headquarters (GCHQ), the UK equivalent of the US NSA, has compromised a number of Global …

IETF to improve the security of Internet protocols

Internet security has been a focus this week for the more than 1100 engineers and technologists from around the world gathered at the 88th meeting of the Internet Engineering …

European NSA is not a solution

The European Parliament should use its powers to reconsider EU-US data transfer deals and push for the creation of a European privacy cloud, EU-level protection for …

Mikko Hypponen: How the NSA betrayed the world’s trust

Recent events have highlighted, underlined and bolded the fact that the United States is performing blanket surveillance on any foreigner whose data passes through an American …

The Circle

The book talks about a near future where the most significant company in the world is The Circle. They don't deal in goods, but in what we all know is the real commodity of …

Apple releases cleverly framed report on government data requests

Apple has released what will be the first of many biannual reports on government information requests it receives, and has included a statement saying that “Apple has …

Can a Swiss cloud give users complete privacy?

Telecom provider Swisscom has announced its plans to set up a “Swiss cloud” that would give both Swiss and later foreign users some peace of mind regarding whether …

Malicious “Apple ID Information Updated” notification doing rounds

An unimaginative but likely relatively successful phishing campaign is targeting Apple users once again, trying to get them to share their login and financial information. The …

The dangers of weakening cybersecurity to facilitate surveillance

In response to the controversy over the alleged surveillance practices of the NSA, the White House established the Review Group on Intelligence and Communication Technologies, …

US agency employees let invented woman expert into the network

Once again, and more spectacularly, security researchers have proved that attackers wielding a fake LinkedIn account sporting the image of an attractive woman claiming to be …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools