The UK Government published the first annual report on the implementation of the 2015 National Security Strategy. The strategy considers…
A zero-day exploit in the wild has been used by threat actors to de-anonymize Tor users by executing malicious code…
In a massive crackdown, European police and law enforcement agencies worldwide seized more than 4,500 domains trading fake brands. The…
The NIST Small Business Information Security: The Fundamentals guide aims to provide basic cybersecurity recommendations to small businesses. I have…
Russia is going to ban Linkedin after a court ruling that found the professional social network to be in violation…
The British Government announces an active defence posture in response to nation-state cyber attacks, Chancellor warns UK will retaliate against…
Security researchers have found vulnerabilities in the source code of the Mirai botnet and devised a method to hack back…
The German Parliament passed a controversial surveillance law that seems to give more power to the BND intelligence agency. The…
According to documents analyzed by The Bristol Cable media Agency, the UK authorities have purchased IMSI-catcher equipment. Privacy advocates and…
Every time you type a number to start an iMessage conversation on your iPhone, Apple logs your message contacts and…
This website uses cookies.