German Minister calls for punishment of US companies involved in NSA spying
The revelations of mass online spying by US government agencies that involved cooperation from the British and the German governments and intelligence services, as well as the …
Advice on Tor use in wake of Freedom Hosting compromise
In the wake of the discovery that someone has compromised Tor hidden services hosted by Freedom Hosting and injected malicious JavaScript aimed at de-anonymizing specific …
Tor users targeted with spyware following anonymous Web-host shutdown
The news that the alleged owner of Freedom Hosting, the internet host for a great number of Tor hidden services, has been arrested and is accused of distributing and promoting …
ZeroAcces rootkit dominates, adds new persistence techniques
According to a recent report by Alcatel-Lucent subsidiary Kindsight, as much as 10 percent of home networks and over 0.5 percent of mobile devices are infected with malware, …
Universities are putting private financial data at risk
HALOCK found that over 50% of the colleges and universities investigated allow for the transmission of sensitive information over unencrypted (and therefore unprotected) email …
New leaks say NSA can see all your online activities
If you have followed the unfolding of the NSA surveillance scandal, you have probably heard the mantra “It’s only metadata!” repeated many times by US …
72k people affected by University of Delaware hack
University of Delaware is the latest of the high-learning institutions in the US to have been hit with a cyber attack that resulted in a data breach. According to a …
Security and privacy risks of top mobile apps
Appthority performed a static, dynamic and behavioral app analysis on the 400 most popular free and paid apps on the iOS and Android platforms. They analyzed each app for …
The scary implications of Google Glass
Google Glass, for all its promise, has some scary implications. Here is my list of potential challenges we face with Glass: User experience Social awkwardness Privacy (or lack …
Online privacy: How did we get here?
As technology has evolved over the past two centuries, so have our expectations about privacy. This new digital world allows us to connect with each other with increasing …
Stanford University suffers another data breach
Stanford University has suffered another IT breach, and while its scope is yet to be determined, all users of the university’s computer system are advised to change the …
Feds to web firms: Hand over encryption keys and user passwords
The US government and its intelligence and law-enforcement agencies have apparently been trying to get Internet firms to hand over both their users’ account passwords …
Featured news
Resources
Don't miss
- The soft underbelly of space isn’t in orbit, it’s on the ground
- Privacy risks sit inside the ads that fill your social media feed
- Should AI access be treated as a civil right across generations?
- What cybersecurity leaders are reading to stay ahead
- Cisco email security appliances rooted and backdoored via still unpatched zero-day