Laws and regulations

UK National Security Strategy, Cyber Security is a top priority

The UK Government published the first annual report on the implementation of the 2015 National Security Strategy. The strategy considers…

9 years ago

The code of a Firefox Zero-Day Exploit used to unmask Tor Users is online

A zero-day exploit in the wild has been used by threat actors to de-anonymize Tor users by executing malicious code…

9 years ago

Europol and other law enforcement agencies shut 4,500 websites peddling fake brands

In a massive crackdown, European police and law enforcement agencies worldwide seized more than 4,500 domains trading fake brands. The…

9 years ago

NIST Small Business Information Security guide for Small businesses

The NIST Small Business Information Security: The Fundamentals guide aims to provide basic cybersecurity recommendations to small businesses. I have…

9 years ago

Russia is going to ban LinkedIn after court ruling. What’s next?

Russia is going to ban Linkedin after a court ruling that found the professional social network  to be in violation…

9 years ago

Philip Hammond invokes an active defence of UK hacking back the attackers

The British Government announces an active defence posture in response to nation-state cyber attacks, Chancellor warns UK will retaliate against…

9 years ago

Hacking back the Mirai botnet, technical and legal issues

Security researchers have found vulnerabilities in the source code of the Mirai botnet and devised a method to hack back…

9 years ago

The German parliament passes controversial a surveillance law

The German Parliament passed a controversial surveillance law that seems to give more power to the BND intelligence agency. The…

9 years ago

UK Police purchased IMSI-catcher technology for mobile surveillance

According to documents analyzed by The Bristol Cable media Agency, the UK authorities have purchased IMSI-catcher equipment. Privacy advocates and…

9 years ago

Why Apple logs your iMessage contacts and other metadata?

Every time you type a number to start an iMessage conversation on your iPhone, Apple logs your message contacts and…

9 years ago

This website uses cookies.