Amnesty International launches Detekt tool to scan for state surveillance spyware on phones and PCs, it was developed by security…
Thousands of patient records in UK are vulnerable to cyber fraudsters after up to 20 trusts under the National Hospital…
Facebook and Yahoo have designed an SMTP extension dubbed RRVS, Require-Recipient-Valid-Since, to prevent illegal use of emails with a new…
New significant software updates Tor Browser 4.0 and Tails 1.2 are available for the popular Privacy Tools used to preserve…
The cyberattack that compromised systems at JPMorgan Chase exposed accounts of 76 million households and seven million small businesses. Data…
The SHA-1 cryptographic hash algorithm has been known vulnerable, Collision attacks against it are too affordable and attacks will get…
Copies of the Elcomsoft EPPB tool are circulating in the underground and could have been used in the recent leak…
Location services are considered a serious threat to privacy because data managed by company like Google could be used for…
The Russian Prime Minister Dmitry Medvedev has signed a decree that will extend the use of SORM-2 to social network…
Google Security experts have detected and blocked unauthorized digital certificates for a number of its domains issued by the NIC…
This website uses cookies.