surveillance
Your iPhone keeps an unencrypted record of your movements
If you are an owner of an iPhone or a 3G iPad, you’ll probably want to know that your location – along with a timestamp – is recorded by the device and …
External cyber security risks to surpass insider threats
57 percent of global C-level executives agree that in the next one-to-three years, external threats such as cyber-criminals will become a greater security risk than insider …
HD video security on the iPad
To help you keep tabs on your home or office anytime, anywhere, Logitech introduced the Logitech Alert app for iPad which makes it easy to access your Logitech Alert digital …
Corporate espionage via social networks
We’ve all heard about HBGary Federal’s COO Aaron Barr’s claims that he leveraged the information gathered on various social networks to discover the …
Chinese hackers behind espionage attacks hitting Western oil firms?
Hackers have targeted five international oil companies and have extracted sensitive corporate information about oil- and gas-field operations, project financing and bidding, …
Chinese spies attempted to spear-phish US diplomats?
While some of the documents from the batch of US diplomatic cables dumped by WikiLeaks have proved to be more explosive than others, every now and then some nugget of …
Who’s watching you? Online fears revealed
Despite lingering concerns about the U.S. economic recovery, Americans worry more about having their online privacy violated (25%) than declaring bankruptcy (23%) or losing …
Worrying increase in surveillance across Europe
A landmark EU-wide study of national privacy safeguards shows a decline in privacy protection across Europe and a steep increase in state surveillance over the lives of …
FBI put backdoors in OpenBSD IPSEC stack?
Some serious allegations have been raised yesterday as Theo de Raadt, founder and leader of the OpenBSD and OpenSSH projects, has made public a private e-mail he received from …
Featured news
Resources
Don't miss
- When loading a model means loading an attacker
- 4 ways to use time to level up your security monitoring
- Hackers claim to have plundered Red Hat’s GitLab repos
- Oracle customers targeted with emails claiming E-Business Suite breach, data theft
- Building a mature automotive cybersecurity program beyond checklists