Please turn on your JavaScript for this page to function normally.
IE10 will have “Do Not Track” on by default

As Microsoft released the preview of the next version of its Internet Explorer browser, news that in Windows 8 the browser will be sending a “Do Not Track” signal …

Could security breaches cost lives?

Over a quarter of companies believe that if their sites go down or they suffer a major security breach it could potentially cost customers’ their lives, according to …

Is Flame something that we should worry about?

Much has been said and written in the last few days since the initial discovery of the so-called Flame (SkyWiper) toolkit. Security researchers have split in two camps: those …

When syncing sinks your browser

Google Chrome’s most recent version (v19) introduced a “tab sync” feature. When inspecting this feature from a security perspective we realized that a new …

Cybercrime goes mobile

Corporate espionage has never been so easy. See how a simple app can transform your smartphone into an espionage tool in the hands of criminals, able to record your …

UFED Touch: Field-ready mobile forensics solution

Cellebrite launched UFED Touch, a solution for investigators to extract and decode digital evidence from mobile devices including smartphones, legacy phones, portable GPSs and …

Dissecting modern privacy concerns

In this interview, Al Raymond, VP of Privacy & Records Management at ARAMARK Corporation, discusses the nature of identity in a digital society, the implications of over …

Privacy trends affecting security

In this podcast recorded at the RSA Conference 2012, Gant Redmon, VP of Business Development and General Counsel at Co3 Systems, talks about future privacy laws and trends …

Will the new EU privacy legislation secure Europe’s digital economy?

At the start of 2012, the European Commission announced it is to undertake a comprehensive review of the EU’s 1995 data protection rules. Its aim is to strengthen online …

SMS spying app offered on Google Play

Phone spying apps are usually offered on hacking forums and third party app markets, but given their malicious potential, it’s unusual to see them being offered for sale …

Organizations struggling to enforce policies for managing records

Despite greater investments in their information management programs, most organizations still struggle with properly implementing those programs and getting employees to …

Fake Amex ID verification email leads to malware

A bogus American Express account ID verification email is currently doing rounds, trying to trick users into following the offered links: The email might look like a phishing …

Don't miss

Cybersecurity news