Edward Snowden doesn’t use an iPhone for privacy reasons
NSA whistleblower Edward Snowden has claimed he doesn't use an iPhone for fear of surveillance technology in the smartphone, reports The Independent.
NSA whistleblower Edward Snowden has claimed he doesn't use an iPhone for fear of surveillance technology in the smartphone, reports The Independent.
Wearable technology and other health-related devices were big at the 2015 Consumer Electronics Show (CES) earlier this month. This recorded webinar explains why these and related technologies present big challenges for data privacy and security.
British Prime Minister David Cameron has stated his belief that encrypted messaging services must have backdoor access to government agencies
President Barack Obama is today to propose legislation that would ensure companies inform customers of any leaks within 30 days of a data breach, reports Physorg.
The Chairwoman of the Federal Trade Commission has offered stern warnings of privacy in relation to the Internet of Things in her opening remarks at CES 2015, reports SC Magazine.
Facebook users around the world have reported the return of the network’s longer-lasting hoaxes - a legal disclaimer which allows users to regain copyright over their images and other content. Here's why it doesn't work.
A website recommended by large portions of the UK's police forces has fixed a privacy bug that provided a "shopping list for burglars" after being tipped off to the exploit by a security researcher, reports the BBC.
A paper from researchers at various universities suggests that security is an area that needs work for wearables, according to a report in The Register.
Moonpig, the online personalised card company, has been accused of a shockingly sloppy attitude to security, after apparently leaving a serious hole in its security unpatched.
Sony executives turned to old BlackBerries found in a basement in the firm's California headquarters in, using SMS text messages and a 'phone tree' to communicate in the wake of the attack.
Facebook is to face a class action lawsuit over ‘reading’ its user’s messages, a U.S. judge has ruled.
Like many others, I was enchanted by The Hobbit (and later Lord of the Rings) at a young age - long before Peter Jackson turned J R R Tolkien's middle-earth fantasy books into a series of blockbuster movies.
Realtime call-monitoring and GPS tracking of partners by domestic abusers is on the rise, both via dedicated electronic listening devices or using sophisticated spyware software.
It's billed as the hottest new messaging app on the planet, and it's rocketed into the top ten in the U.S. in just a year. But how safe are you on Yik Yak?
The recent hacking of Sony Pictures offers valuable lessons in cybersecurity from which every company and consumer can learn.
A host of UK broadband providers are hijacking people's browsers mid-session to force them into making decisions on adult content filters.
Turns out that the Material Girl has had her material stolen, and she's blaming hackers!
Hackers can eavesdrop on your phone calls and text messages even with cell networks using "the most advanced encryption available" according to The Washington Post.
The ride-sharing app Uber has unveiled new security plans to screen drivers, helping ensure passenger safety, Engadget reports.
Our tips will help you hacker-proof anything from baby monitors to surveillance cameras - and keep your home private.