
Researchers uncover mobile, PC surveillance platform tied to different nation-state actors
The Electronic Frontier Foundation (EFF) and mobile security company Lookout have uncovered a new malware espionage campaign that has targeted activists, journalists, lawyers, …

Norwegian health authority hacked, patient data of nearly 3 million citizens possibly compromised
Hackers have breached the systems of the Southern and Eastern Norway Regional Health Authority (Helse Sør-Øst RHF), and possibly made off with personal information and health …

What is the impact and likelihood of global risks?
The World Economic Forum, a not-for-profit foundation that each year gathers participants from around the world to discuss a wide range of global issues, has published its …

Why GDPR will drive a best practice approach
When GDPR was first discussed, many feared that it would force businesses to act more insular and become more defensive about their data. Some even believed there would be a …

More than half of US-based employees have never heard of GDPR
With the General Data Protection Regulation (GDPR) deadline approaching, new research from MediaPro shows more than half of US-based employees have never heard of the …

CBP releases new guidelines on phone, laptop searches at US borders
Late last week, the US Customs and Border Protection agency released an update to its Directive governing Border Searches of Electronic Devices. According to the new …

Building a program for GDPR compliance: Can you answer these key questions?
The clock is ticking and the General Data Protection Regulation (GDPR) will start to be enforced in May. Now is a critical time for organizations to plan, budget and make any …

Complex regulations and sophisticated cyberattacks inflate non-compliance costs
The cost of non-compliance has significantly increased over the past few years, and the issue could grow more serious. 90 percent of organizations believe that compliance with …

1.4 billion unencrypted credentials found in interactive database on the dark web
A data dump containing over 1.4 billion email addresses and clear text credentials is offered for download in an underground community forum. What’s so special about …

How cybersecurity solutions can help with GDPR compliance
Technical (protection) measures, means, technologies, rules and resources are mentioned multiple times throughout the GDPR text. The Regulation does not, however, specify any …

Is your mainframe security GDPR compliant?
Only one in four IBM mainframe customers questioned in a new UK survey are confident that their system security complies with the incoming General Data Protection Regulation …

How secure are cryptocurrency mobile apps?
Are the mobile apps you’re using to store or handle your cryptocurrency stash, track the currencies’ price, or interact with cryptocurrency exchanges secure? …
Featured news
Resources
Don't miss
- CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide
- Malicious RVTools installer found on official site, researcher warns
- AI hallucinations and their risk to cybersecurity operations
- Why EU encryption policy needs technical and civil society input
- Hanko: Open-source authentication and user management