Encrypted chat apps: Give ’em nothing to talk about
Update: we've done a follow-up post about even more encrypted chat apps for you to keep your conversations private!
In...
Kaspersky: Macs overripe for malware threats
Security firm Kaspersky recently released its Security Bulletin for 2014, detailing critical cybersecurity statistics gathered in the last year....
Snowden files: How NSA tapped 71% of the world’s phone networks...
An ambitious NSA operation dubbed Auroragold aims to tap every cellphone network in the world, according to The Intercept.
The...
DeathRing: Some Android phones come pre-loaded with malware
If you are looking to buy a new Android smartphone you are probably already aware that it is a...
Mix Chewbacca with Dexter, Get LusyPOS
Darknet markets have been found selling LusyPOS, a new type of point-of-sale malware which is similar in nature to...
DuckDuckGo Internet privacy review
If you need to find something of interest, your first port of call will be a search engine, of which...
Literally malware? The figurative explosion of Uber’s app
Last week, The Hacker News posted an article about the mobile app offered by ride-sharing service Uber — turns...
Your data, your rules: The encryption of everything
Who owns your data? The common sense answer is obvious, but isn't always true: in certain situations, law enforcement...
Who created the Regin malware?
A few weeks ago, security vendor Symantec discovered an advanced piece of malware that it says has been used...
Our response to an OpenVPN denial of service vulnerability
Hello everyone!
We wanted to keep you informed on a new security vulnerability that affected OpenVPN late last month. Fortunately,...