Why are hackers increasingly targeting the healthcare industry?
Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack. In general, the …
Unsecured security cameras lead to privacy erosion
The results of a recent analysis of some 6,000 open security cameras across the United States has shown that 15 percent of them are located in users’ private homes. Open …
Changes to Rule 41 will increase law enforcement hacking, surveillance
The Electronic Frontier Foundation (EFF), the Tor Project, and dozens of other organizations are calling on citizens and website operators to take action to block a new rule …
Blackphone users get a virtual privacy assistant
Silent Circle has pushed out a new version of Silent OS, the operating system running on Blackphone 2 devices, and it comes with several privacy and security enhancements, …
How to consolidate your sensitive data footprint
Data is the driving force behind every organization, whether an organization is primarily a retailer, a manufacturer, healthcare provider or a bank, it will possess some if …
Let’s Encrypt CA inadvertently leaks users’ email addresses
Let’s Encrypt, the non-profit Certificate Authority (CA) that helps website administrators switch from HTTP to HTTPS quickly and effortlessly, has accidentally leaked …
Tor Browser 6.0 released
The Tor Browser lets you use Tor on Windows, OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser …
GDPR: Essential glossary
GDPR is the acronym for General Data Protection Regulation, itself a shorthand for “Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April …
Review: ProtonMail
ProtonMail is an email service developed by a team of scientists who met while working at the European Organization for Nuclear Research (CERN) in Switzerland. The idea behind …
Who’s tracking you online, and how?
Armed with a tool that mimics a consumer browser but is actually bent on discovering all the ways websites are tracking visitors, Princeton University researchers have …
Industry reactions to the EU General Data Protection Regulation
As of today, businesses have just two years to become compliant to the EU General Data Protection Regulation (GDPR) or risk major fines. Businesses will need to take adequate …
FBI warns about keyloggers disguised as USB device chargers
A private industry notification issued by the FBI in late April may indicate that keyloggers disguised as USB device chargers have been fund being used in the wild. The …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits