EU data directive reform could be a business burden
The imminent reform of the European Data Protection Directive could be ineffective in the short term and place further financial and security burdens upon European businesses …
Tool to detect Carrier IQ
Bitdefender announced the availability of a new tool that identifies the presence of the controversial mobile network diagnostic tool from Carrier IQ. Dubbed Carrier IQ …
AT&T and Sprint acknowledge use of Carrier IQ
The Carrier IQ issue continues to unravel as phone manufacturers and some carriers fall over each other in the rush to distance themselves from any involvement with it and the …
Mobile carriers to blame for use of secret logging software?
The recent revelation that most Android, BlackBerry and Nokia phones are installed with the Carrier IQ software that logs practically all actions made by the mobile phone …
Data breaches up 32 percent
The frequency of data breaches in healthcare organizations has increased by 32 percent, with hospitals and healthcare providers averaging four data breaches, according to the …
Researcher proves hidden software logs everything on mobile phones
By now, you have already heard about the claims made by 25-year-old Trevor Eckhart that the Carrier IQ software – designed by an eponymous Mountain View company – …
1000+ UN emails, usernames and passwords leaked
A group of hackers that go by the name of “Teamp0ison” has apparently hacked one (or more) of UN’s servers and dumped over 1000 email addresses, usernames …
73,000 Finnish online accounts compromised
The login credentials and email addresses of some 73,000 Finns have been stolen and posted online by unknown attackers who breached the database used by a network of …
Anonymous bloggers in danger of being exposed
You’re a blogger who, for whatever reason, wishes to remain anonymous. You are careful not to mention anything that could tie the blog to you, and you have gone through …
ISPs can’t be forced to filter file-sharing traffic, says EU court
European ISPs will not be required to filter electronic communications which use file-sharing software in order to prevent file sharing which infringes copyright, the European …
ID theft prevention tips
With the rise in online shopping and mobile shopping it’s more important than ever for consumers to take precautions against identity theft this holiday season. …
New IP geolocation technology
ReD announced an upgrade to its IP Geolocation detection technology which enables ReD to track fraud threats using IP identification and geolocation information. This is an …
Featured news
Resources
Don't miss
- Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
- Microsoft blocks risky file previews in Windows File Explorer
- Building trust in AI: How to keep humans in control of cybersecurity
- Researchers expose large-scale YouTube malware distribution network
- Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)