
Blackphone review: is a secure smartphone possible?
We have bought our very own Blackphone to check its security firsthand.
756 articles
We have bought our very own Blackphone to check its security firsthand.
Malware using Tor for communication with C&C servers is a novelty; it may not make the malware itself more dangerous, but eradicating it becomes a much more serious problem.
Losing your work or personal data is a computing worst case scenario. While there is no shortage of ways you can lose your data, there are also a number of protections that can help.
Your iPhone runs hidden monitoring services. Who uses them, and for what purpose?
Making a case for password reuse, Google hiring hackers to fix the Internet, Apple bolsters security across its services with strong Crypto, plus various fixes and more.
451 Research has released a very complimentary overview of Kaspersky Lab’s current position and strengths. Here’s some commentary from their report.
The first summer month brought us news about the eternal confrontation of law enforcements and cybercriminals. Let’s see who was busted in June.
Big Data means increased risks: a large-scale leak may lead to tremendous reputational damages, so cyber-resilience is extremely important.
Big Data is widely used for security purposes, especially in the banking sphere. However, the amount of security-related data causes an issue of its own.
Big Data is widely used by businesses to gather information on their consumers. But it’s quite evident that the same Big Data may be used against the businesses as well.
This week: the first mobile malware turns 10; we check in on Android security news and recent data breaches; and we fill you in on the week’s patches.
Having a chance to store as much as we want is a good thing, but is it bringing us more problems than advantages?
Discussing security and the privacy strengths and weaknesses in the Apple’s soon-to-be-released iOS 8.
Two months have passed since the Heartbleed disclosure. Now it is time for a round-up: What damage did it inflict and what can we expect?
Computer ransomware is getting more sophisitcated, while mobile cryptolockers are emerging both in Europe and the U.S.
Enabling two-factor authentication makes it significantly harder for an attacker to compromise your online accounts, but what is it and when should you use it?
Apple has announced new versions of its operating system. OS X and iOS become closer, gradually merging into a single environment. How well is it protected?
May 2014 appears to be very stormy and volatile in regards to information security. Still overshadowed by Heartbleed and Windows XP “official demise” from April, it has brought a lot of troubles on its own.
A new piece of ransomware targeting Apple users emerges along with a hybrid malware combining Zeus and Carberp. There’s also an issue with the Spotify Android app.
Something very weird is going on with the popular free whole-disk encryption suite TrueCrypt. The story is still developing, but it does look like the suite ceases to exist right