How to protect yourself from cloud service leaks
Don’t want your private photos or credit card posted somewhere on the web? You should rethink your approach to cloud services then.
750 articles
Don’t want your private photos or credit card posted somewhere on the web? You should rethink your approach to cloud services then.
Brian Donohue and Chris Brook recap the month’s security headlines from its beginnings at Black Hat and DEFCON, to a bizarre PlayStation Network outage.
Sextortion is one way online predators can steal your sensitive data and use it to harm you.
Community Health Systems breach exposes the Social Security numbers of 4.5 million patients. Were you a victim? If so, how do you react?
We have bought our very own Blackphone to check its security firsthand.
A recap of last week’s security news and research from the Black Hat hacker conference in Las Vegas, Nevada.
Yahoo plans to implement end-to-end encryption for all of its mail users, giving normal, non-technical users the power to communicate securely and privately.
Despite the fact that we have cheap unlimited Internet connection almost everywhere, there are situations when each megabyte is literally worth its weight in gold.
In the news this week: more APT campaigns, a look forward at the DEF CON and Black Hat Hacker conferences, and good and bad news for Facebook.
In the news: Microsoft’s No-IP takedown fiasco, Chinese APT groups curious about U.S. Iraq policy, Verizon says the government wants locations data, and Microsoft denies backdoor insinuations.
Facebook fails to fully encrypt data on its Instagram mobile app, which puts user security and privacy at risk.
If you think that threat isn’t real, ask Miss Teen USA 2013, whose webcam was hacked into and used to take nude photos of her.
The list of highly touted devices that have been launched in recent years with embarrassing flaws – security and otherwise – is long and distinguished.
Let’s analyze new safety features in the upcoming Android release while we wait for it to arrive.
Wrapping up our Big Data Week, in this post we talk about potential of abuse of Big Data, which is arguably extreme.
Big Data means increased risks: a large-scale leak may lead to tremendous reputational damages, so cyber-resilience is extremely important.
June was a busy month with hacks and data breaches, privacy, cryptography, and mobile security news, and an update on OpenSSL Heartbleed.
Big Data is widely used by businesses to gather information on their consumers. But it’s quite evident that the same Big Data may be used against the businesses as well.
This week: the first mobile malware turns 10; we check in on Android security news and recent data breaches; and we fill you in on the week’s patches.
Discussing security and the privacy strengths and weaknesses in the Apple’s soon-to-be-released iOS 8.