Please turn on your JavaScript for this page to function normally.
CIA Twitter
Twitter reactions to the WikiLeaks CIA data dump

Here are some interesting Twitter reactions regarding the WikiLeaks release of 8,761 documents and files they claim originate from an isolated, high-security network situated …

IoT world
IoT goods, software and digital services to be evaluated for privacy and security

Consumer Reports, a US non-profit group whose extensive reviews of consumer goods have helped the public make informed and better choices for many decades, has announced that …

brain
CloudPets connected toys can be turned into remote surveillance devices

The CloudPets data breach saga continues, as Spiral Toys finally reported the breach to the California Attorney General’s Office. As a reminder: Leaked data provided to …

EU flag
Businesses still confused about GDPR

European businesses are still unsure about GDPR – almost 78% of IT decision makers at more than 700 European companies either lacked understanding about the impact of …

hole
Millions of smart devices in Spain are vulnerable to attack

Avast revealed the findings of its research experiment into smart devices, including public and private webcam vulnerabilities in Spain, and, specifically, in Barcelona. Avast …

healthcare
The devastating impact of healthcare data breaches

One in four U.S. consumers have had their personal medical information stolen from technology systems, according to Accenture. The findings show that half of those who …

architecture
Key obstacles to digital transformation and data privacy compliance

To stay relevant in an increasingly digital world, companies are either starting to or are currently in the process of transforming their digital environment to improve …

Eye
How IDF soldiers’ phones got turned into spying devices

For many months now, an unknown threat actor has been tricking servicemen in the Israel Defense Forces (IDF) into installing Android spyware. Israeli media says that the …

IoT
The dangers that come with buying pre-owned IoT devices

When you buy a second-hand connected car, can you be sure that it is not still not reachable by its former owner? Similarly, when you sell your own connected car, how can you …

encryption data
Global geopolitical changes driving encryption adoption

Recent global geopolitical changes have made more people and organizations than ever worry about the privacy of their data, and consider increasing their use of encryption to …

USA flag
Americans increasingly worry about online privacy and security

Americans are increasingly concerned about their online privacy and security, and apprehensive about increased government surveillance in the new presidential administration, …

signal app icons
Secure comms app Signal now offers encrypted video calls

Users of secure chat and voice call app Signal will soon be able to enjoy the option of encrypted video calls. For the moment, only calls between Signal users who have both …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools