Please turn on your JavaScript for this page to function normally.
Amazon Key
Would you let Amazon unlock your door?

Amazon recently announced the launch of the Amazon Key, allowing the Amazon delivery person to open your door in order to place your package inside, where presumably it will …

Seagate surveillance
Seagate launches SkyHawk AI, the first HDD for AI-enabled surveillance

Seagate announced its SkyHawk AI hard disk drive, the first drive created specifically for artificial intelligence enabled video surveillance solutions. SkyHawk AI provides …

fight
Why end-to-end encryption is about more than just privacy

The question of whether regular people need end-to-end encryption will surely be debated for quite some time. But for Alan Duric, CEO and co-founder of Wire, the question can …

Privacy
European court says workplace surveillance must not violate workers’ privacy

European companies must strike a fair balance between workplace surveillance and their employees’ right to privacy, the European Court of Human Rights (ECHR) has ruled. …

Hackers can turn Amazon Echo into a covert listening device

New research released by MWR InfoSecurity reveals how attackers can compromise the Amazon Echo and turn it into a covert listening device, without affecting its overall …

Android malware
Lippizan: Sophisticated, targeted spyware on Google Play

Google has discovered targeted spyware on Google Play that is likely the work of Equus Technologies, an Israeli cyber surveillance technology dealer. The malware, dubbed …

Thyssen-Bornemisza Museum
How a museum protects some of the world’s finest pieces of art

After an internal audit revealed the limitations of Thyssen-Bornemisza Museum’s existing (analog) camera surveillance system, as well as a server that has been installed …

Berlin
German law enforcement gets new hacking powers

On Thursday, the Bundestag has voted to accept a new amendment that will expand the German police’s hacking powers. The new amendment will allow them to use so-called …

UK flag
UK govt wants real-time communication surveillance powers, courtesy of telcos

A leaked draft of proposed regulations shows that the UK government is after greater communication surveillance powers, and that in order to get them, it will legally require …

Android malware
iOS spyware Pegasus has an equally capable Android counterpart

Mobile security firm Lookout and Google have revealed the existence of Chrysaor (aka Pegasus for Android), a powerful espionage app that is believed by both companies to be …

CIA Twitter
Twitter reactions to the WikiLeaks CIA data dump

Here are some interesting Twitter reactions regarding the WikiLeaks release of 8,761 documents and files they claim originate from an isolated, high-security network situated …

CIA
Leaked: Docs cataloguing CIA’s frightening hacking capabilities

WikiLeaks has released 8,761 documents and files they claim originate from the US Central Intelligence Agency (CIA) – more specifically, from an “isolated, …

Don't miss

Cybersecurity news