NSA leaks Director of national intelligence: Snowden forced “needed transparency” Edward Snowden faces John Oliver’s semi-tough questions SIM card makers […]
Archive : Security
How hackers can access iPhone contacts and photos without a password
iPhone users have yet another screenlock bypass vulnerability to watch out for, according to a new video demonstration that shows […]
Black Hat Europe 2015: Ready to Play Defense?
Implementing a strong defensive posture might not garner much overt recognition, but a job well done will let you sleep […]
FTC v. Wyndham: ‘Naughty 9′ Security Fails to Avoid
The Federal Trade Commission’s fair trade suit against Wyndham hotels offers insight into the brave new world of cybersecurity regulation […]
NHS Health Apps Library full of data-spaffing apps, claims studies
Researchers from Imperial College London have published three studies in the journal BMC Medicine, provoking serious concerns about the mobile […]
Webcast: How to prevent data loss and theft
Register now to watch our live Regcast, where help your business deal with Data Loss Prevention and Data Theft Prevention […]
‘Self-deleting’ Mexican ATM malware let sneaky miscreants slurp cash
Security researchers have lifted the lid on a new ATM malware strain, dubbed GreenDispenser, which gives crooks the ability to […]
Living in a Code Yellow World
Living in a Code Yellow World In the 1980s, handgun expert Jeff Cooper invented something called the Color Code to […]
Obama administration explored backdoors for bypassing smartphone crypto
An Obama Administration working group considered four backdoors that tech companies could adopt to allow government investigators to decipher encrypted […]
Cisco Offers Free Tool To Detect SYNful Knock Router Malware
Tool helps businesses detect routers running known version of newly discovered malicious implant. Cisco Systems enterprise users now have a […]