Latest News

Facebook Messenger Starts Testing End-to-End Encryption

Facebook is planning to use end-to-end encryption for its Messenger app and has begun rolling out the feature. Facebook has

Edward Snowden Designs an iPhone Case to Detect & Block Wireless Snooping

We just cannot imagine our lives without smartphones, even for a short while, and NSA whistleblower Edward Snowden had not

Beware: DDOS attacks a greater threat than ever

DDoS attacks are on the increase with an average of 124,000 attacks per week over the last 18 months reported

ATM Security in the Battle Against Fraud and Physical Attacks

For today’s banks the monitoring and security of ATMs is a major priority. Not content with card skimming – where

Belgium Tops List of Nations Most Vulnerable to Hacking

A new “heat map of the internet” has revealed the countries most vulnerable to hacking attacks, by scanning the entire

AT&T Highlights Progress in 5G Lab Trials, New Markets and Vendors

DALLAS, Texas, June 6, 2016 /PRNewswire/ — AT&T* is now working with Nokia to expand our 5G lab trial work.  In

Sabotage of telecoms masts reignite Swedish security fears

The mysterious suspected sabotage of three telecommunications masts, key parts of Sweden’s infrastructure, has reignited fears of foreign spies and

Prioritizing Patch Management Critical to Security

That lack of attention can cost. Recent stats from the Verizon Data Breach report showed that many of the most

This sneaky mobile malware just evolved into something even nastier

A piece of Android malware designed to steal banking log-ins has added UK banks to its list of targets in

Irongate ICS Malware Steals From Stuxnet Playbook

New malware that targets industrial control systems called Irongate was found by researchers who say the discovery should serve as

Knowledge of attack patterns key to protecting digital operations

Companies and organizations must be able to first identify all cyberattack patterns in an attempt to develop a reliable protection

Study Finds Widespread HIPAA Violations Occurring on Yelp

It is no secret that the Health Insurance Portability and Accountability Act (HIPAA) is a trap for the unwary. A

An in-depth guide to turning a product into an open source project

One occasionally runs into a company trying to build an open source project out of an existing product. This is

Rowhammer Attacks on Microsoft Edge Can Compromise Entire PC, New Research Shows

Four researchers from the Vrije University in the Netherlands have put together a successful attack on Windows 10 that uses

Student convicted after finding encryption flaws in government network

A student from the University of Maribor in Slovenia has ended up with a prison sentence after finding cryptographic flaws

Qualcomm Expects Chip Family to Enable Wireless Virtual Reality

TAIPEI—Qualcomm, the world’s largest supplier of chips for mobile devices, announced a suite of chips today at the Taipei Computex