Please turn on your JavaScript for this page to function normally.
Cybercrime and Espionage

The authors, seasoned experts in the information security field with obvious intelligence insights, provide the readers with an interesting overview of the current biggest …

Flash bug allows spying of website visitors through webcam

A slight variation of a previously designed clickjacking attack that used a Adobe Flash vulnerability has once again made it possible for website administrators to …

How the German “Federal Trojan” was actually used

After the Chaos Computer Club hackers made public the results of their analysis of a few samples of the so-called “Federal Trojan” and found it capable of more …

Law enforcement increasingly asking Internet companies to share data

The fact that one can find out a lot about a person’s interests, movements and opinions from their Facebook and Twitter accounts, Google searches and messages exchanged …

A new approach to circumventing state-level Internet censorship

A group of researchers led by J. Alex Halderman, assistant professor of electrical engineering and computer science at the University of Michigan, have been working on a new …

Did U.K. journalists use malware to spy on people?

The scandal that led to the demise of U.K. newspaper News of the World and to an investigation into the illegal methods used by journalists and editors in order to acquire …

Your iPhone keeps an unencrypted record of your movements

If you are an owner of an iPhone or a 3G iPad, you’ll probably want to know that your location – along with a timestamp – is recorded by the device and …

External cyber security risks to surpass insider threats

57 percent of global C-level executives agree that in the next one-to-three years, external threats such as cyber-criminals will become a greater security risk than insider …

HD video security on the iPad

To help you keep tabs on your home or office anytime, anywhere, Logitech introduced the Logitech Alert app for iPad which makes it easy to access your Logitech Alert digital …

Corporate espionage via social networks

We’ve all heard about HBGary Federal’s COO Aaron Barr’s claims that he leveraged the information gathered on various social networks to discover the …

Chinese hackers behind espionage attacks hitting Western oil firms?

Hackers have targeted five international oil companies and have extracted sensitive corporate information about oil- and gas-field operations, project financing and bidding, …

Chinese spies attempted to spear-phish US diplomats?

While some of the documents from the batch of US diplomatic cables dumped by WikiLeaks have proved to be more explosive than others, every now and then some nugget of …

Don't miss

Cybersecurity news