Digital ID

Detekt is the free tool to detect state spyware on phones and PCsDetekt is the free tool to detect state spyware on phones and PCs

Detekt is the free tool to detect state spyware on phones and PCs

Amnesty International launches Detekt tool to scan for state surveillance spyware on phones and PCs, it was developed by security…

11 years ago
NHS Trusts fail to Extend Outdated Windows XP Security Support with MicrosoftNHS Trusts fail to Extend Outdated Windows XP Security Support with Microsoft

NHS Trusts fail to Extend Outdated Windows XP Security Support with Microsoft

Thousands of patient records in UK are vulnerable to cyber fraudsters after up to 20 trusts under the National Hospital…

11 years ago
RRVS, Facebook and Yahoo work to prevent identity theftRRVS, Facebook and Yahoo work to prevent identity theft

RRVS, Facebook and Yahoo work to prevent identity theft

Facebook and Yahoo have designed an SMTP extension dubbed RRVS, Require-Recipient-Valid-Since, to prevent illegal use of emails with a new…

11 years ago
New releases of Tor Browser 4.0 and Tails 1.2 to preserve your privacyNew releases of Tor Browser 4.0 and Tails 1.2 to preserve your privacy

New releases of Tor Browser 4.0 and Tails 1.2 to preserve your privacy

New significant software updates Tor Browser 4.0 and Tails 1.2 are available for the popular Privacy Tools used to preserve…

11 years ago
JPMorgan – 76 million households and 7 million small businesses account exposedJPMorgan – 76 million households and 7 million small businesses account exposed

JPMorgan – 76 million households and 7 million small businesses account exposed

The cyberattack that compromised systems at JPMorgan Chase exposed accounts of 76 million households and seven million small businesses. Data…

11 years ago
SHA-1 has been deprecated, what can I do?SHA-1 has been deprecated, what can I do?

SHA-1 has been deprecated, what can I do?

The SHA-1 cryptographic hash algorithm has been known vulnerable, Collision attacks against it are too affordable and attacks will get…

11 years ago
EPPB tool copies usable to download victims’ data from iCloud backupsEPPB tool copies usable to download victims’ data from iCloud backups

EPPB tool copies usable to download victims’ data from iCloud backups

Copies of the Elcomsoft EPPB tool are circulating in the underground and could have been used in the recent leak…

11 years ago
Location services, Google is tracking your every move you makeLocation services, Google is tracking your every move you make

Location services, Google is tracking your every move you make

Location services are considered a serious threat to privacy because data managed by company like Google could be used for…

11 years ago
New powers for the Russian surveillance system SORM-2New powers for the Russian surveillance system SORM-2

New powers for the Russian surveillance system SORM-2

The Russian Prime Minister Dmitry Medvedev has signed a decree that will extend the use of SORM-2 to social network…

11 years ago
Google blocked unauthorized digital certificates issued by NIC IndiaGoogle blocked unauthorized digital certificates issued by NIC India

Google blocked unauthorized digital certificates issued by NIC India

Google Security experts have detected and blocked unauthorized digital certificates for a number of its domains issued by the NIC…

11 years ago