Archive

Quite literally, every day someone gets hacked. Whether that’s a telecommunications company having its customer data stolen, or another chain of businesses being ripped for all the credit cards it processes, today one hack just seems to melt into another.

“What if you stuff a bunch of LEDs around the eyeballs?” asked scientists. And then they answered their own question. Microsoft Research just presented a new paper, titled “Augmenting the Field-of-View of Head-Mounted Displays with Sparse Peripheral Displays” at a

Hundreds of Spotify account details have been leaked online, but the Swedish music streamer is telling all to move along, please: nothing to see here and nothing’s been breached. Nobody seems to know if the data posted to Pastebin on

MANILA, Philippines – The Philippine government seems to be a favorite target of hacking, given the number of defaced websites in recent years. Following in the footsteps of so-called hacktivists, some have resorted to breaching systems to voice their concerns

BlackBerry is finally rolling out the Android 6.0 Marshmallow update for PRIV users. The update has so far been rolled out only to the STV100-1 and STV100-4 variants of the Priv. The STV100-1 is the Priv variant sold in the

FBI Director James Comey said Tuesday he has seen some improvement in cooperation from China in fighting cybercrime following last year’s bilateral agreement on the issue. Chinese authorities “seem to have an agreed upon framework for what is nation-state action

Has encryption technology given the bad guys a way to operate in the dark? Or has the new tech age gifted law enforcement with unprecedented surveillance powers? A weeks-long showdown between the FBI and Apple ended last month without a

With data breaches and ransomware attacks now commonplace, smart companies are now more concerned than ever about safely and securely storing their data. Rubrik, the market leader in Converged Data Management, has unveiled the r528, the industry’s first security enhanced

The sophistication of encryption technology has been advanced by around seven years as a result of the Snowden revelations, according to the U.S. Director of National Intelligence James Clapper. Clapper said that former National Security Agency (NSA) contractor Edward Snowden

END-TO-END ENCRYPTION BY default is quickly becoming the new standard for any communications app that claims to care about the privacy of those who use it. But not all encryption is created equal. And default doesn’t always mean default. In

NSA whistleblower and privacy advocate Edward Snowden took part in his first public debate on encryption on Tuesday night, facing off against CNN’s Fareed Zakaria, a journalist and author known for his coverage of international affairs. Zakaria, in New York,

he US Government is planning to build an alternative to WhatsApp and iMessage that is practically unhackable. Darpa, the advanced technologies arm of the US Department of Defense, posted an online request inviting candidates to “create a secure messaging and

Dutch law enforcement has arrested and is holding the owner of Ennetcom, an encrypted communications network which is allegedly used by organized crime rings. Ennetcom calls itself a “true pioneer” in secure network communication and cybersecurity. Used by thousands of

DARPA, the Defense Advanced Research Projects Agency, needs a secure communication and transaction platform that utilizes all the encryption tactics and security features, which popular messaging apps like WhatsApp, Richochet or Signal uses. However, DARPA also aims to create a

Norwegian security vendor Hiddn Security has just had a couple of international breakthroughs. First, its technology has been chosen by the Netherlands government to encrypt laptops and desktop PCs in the country’s public sector. And second, the American National Institute

Reputation is everything in business: it appears a bunch of canny scammers have stolen the identity of a hacking squad to make some serious bank. Back in November, a group calling itself the Armada Collective carried out a series of