Operation Tempora, is the name of GCHQ program to tap fibre-optic cables for secret access to communications. Operation Tempora, this is…
The U.S. NSA is collecting phone records of millions of Verizon Communications customers, according to a secret court order obtained by…
German researchers revealed that Microsoft is able to intercept Skype conversation for security reason. Which are risks to the users'…
Yahoo Japan Corp is investigating on a possible data breach that may have exposed 22 million user IDs stolen during…
Bloomberg was the victim of an accident data breach, financial data and news service posted online more than 10,000 private…
Cybersecurity goes to the offensive, law enforcement and private companies are discussing the possibility to adopt an offensive approach to…
Apple can "bypass the security software" if it chooses, accoring ATF no law enforcement agency could unlock a defendant's iPhone except…
A nightmare come true, last Thursday The United States House of Representatives approved the debated cyber security bill, the act…
Researchers at Hacktive Security, an independent security consulting company, have demonstrated how much insidious could be a so a simple…
Today I desire to present the excellent work produced by freelance writer Gillian Holmes and the team of BackgroundCheck.org, as…
This website uses cookies.