Please turn on your JavaScript for this page to function normally.
When syncing sinks your browser

Google Chrome’s most recent version (v19) introduced a “tab sync” feature. When inspecting this feature from a security perspective we realized that a new …

Cybercrime goes mobile

Corporate espionage has never been so easy. See how a simple app can transform your smartphone into an espionage tool in the hands of criminals, able to record your …

UFED Touch: Field-ready mobile forensics solution

Cellebrite launched UFED Touch, a solution for investigators to extract and decode digital evidence from mobile devices including smartphones, legacy phones, portable GPSs and …

Dissecting modern privacy concerns

In this interview, Al Raymond, VP of Privacy & Records Management at ARAMARK Corporation, discusses the nature of identity in a digital society, the implications of over …

Privacy trends affecting security

In this podcast recorded at the RSA Conference 2012, Gant Redmon, VP of Business Development and General Counsel at Co3 Systems, talks about future privacy laws and trends …

Will the new EU privacy legislation secure Europe’s digital economy?

At the start of 2012, the European Commission announced it is to undertake a comprehensive review of the EU’s 1995 data protection rules. Its aim is to strengthen online …

SMS spying app offered on Google Play

Phone spying apps are usually offered on hacking forums and third party app markets, but given their malicious potential, it’s unusual to see them being offered for sale …

Organizations struggling to enforce policies for managing records

Despite greater investments in their information management programs, most organizations still struggle with properly implementing those programs and getting employees to …

Fake Amex ID verification email leads to malware

A bogus American Express account ID verification email is currently doing rounds, trying to trick users into following the offered links: The email might look like a phishing …

Twitter supports “Do Not Track” option

The news was announced by Ed Felten, the US Federal Trade Commission’s CTO, at a New York Internet Week privacy panel, and Twitter has quickly come out to confirm it: …

Most CCTV systems are easily accessible to attackers

The use of CCTV cameras for physical surveillance of all kinds of environments has become so pervasive that most of us don’t give the devices a second thought anymore. …

Kickstarter bug granted access to unlaunched projects

A bug in the private application programming interface (API) of Kickstarter, the popular crowd funding website for creative projects, has exposed details about 70,000 projects …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools