Leaving Laptops in Hotel Rooms: A Bad Idea
A laptop filled with data? An external HDD filled with even more data? There’s bound to be a phone – possibly two if you spend a lot of time inRead More →
Data Security News | Infosec Blog | Information Security Tutorials
A laptop filled with data? An external HDD filled with even more data? There’s bound to be a phone – possibly two if you spend a lot of time inRead More →
In the wake of the TalkTalk Scandal, Vodafone finally admitted that hackers did manage to steal around 20,000 Vodafone customers’ bank details. According to the Mobile Phone provider firm, hackersRead More →
My last on-topic post pontificated about the dangers and surprise of letting third parties into your house or codebase, where I discussed the addition of a TV DVR system to myRead More →
The European Parliament has voted in favour of a resolution that calls on all EU member states to “drop any criminal charges against Edward Snowden, grant him protection and consequentlyRead More →
A cyber-security industry group has published new research on the CryptoWall ransomware campaign, finding that the attacks have generated more than $300m in ransom income and stem from a singleRead More →
The two platforms drive different devices. But would combining them really be a bad thing? On Thursday, the The Wall Street Journal published a report claiming that Google is inRead More →
A new chat tool has been launched in an effort to improve the security of online messaging. Tor Messenger allows users to chat over the Tor (The Onion Router) networkRead More →
Calling the formal recognition of the .onion as a Special-use Domain Name by the Internet Engineering Task Force (IETF) “a small and important landmark in the movement to build privacyRead More →
Google began to implement SSL on its search engine back in 2010. First on its own domain name, then as a mandatory feature for logged in Google users, andRead More →
US Army Military experts urge the establishment of an Army Vulnerability Response Program (AVRP), a sort of military bug bounty program. What happen when bug hunters have to work with high sensitiveRead More →