Anatomy of a malicious script: how a website can take over your browser
What can a site do to you, or to your device, without your explicit consent? What happens when you visit […]
What can a site do to you, or to your device, without your explicit consent? What happens when you visit […]
With investigations underway in both the U.S. and the EU following the Facebook and Cambridge Analytica data breach, American and […]
Data breach can cost $3.86 million, according to IBM report. The amount of time it takes to find a data […]
Corporate Wi-Fi networks and employee mistakes make all corporate networks vulnerable to attacks from hackers, according to Positive Technologies. The report […]
A majority of consumers surveyed also say that the US government should get involved by mandating stricter privacy and security […]
Researchers have uncovered a new malicious campaign which utilizes stolen D-Link certificates to sign malware. The same certificate was used […]
It’s an important question because, obviously personal data need to be protected, and you need to insure confidentiality, integrity and […]
Google said that its document writing tool Google Documents was secure even as Russian internet users discovered scores of files […]
Some of the most popular mobile apps are letting just anyone access your personal data. Millions of passwords, GPS locations, and […]
Ransomware. Malware. Phishing. Given the types of high profile cyberthreats that carry the most coverage in the news, there is […]
Blockchain technology creates counterfeit-proof information on a network we can trust. Instead of sharing our date of birth again and […]
Companies could get products like smart medical devices and connected cars certified by the same standards across all European Union […]