The first stage of Blackphone came with a few flaws especially in the usability department, however, Silent Circle, the company that developed the Blackphone, has returned with a second device that has a promising security infrastructure. Not to mention, the usability is much better, according to recent reports.
Cyber security is one of the hottest topics in mainstream news and the internet. Following the U.S. federal government breaches and the Ashley Madison breaches, the amount of stolen personal information floating around the cyber black market is extensive. Google intends on helping crackdown on the cybercrime economy.
In the U.S. the amount of freedom on the net is taken for granted. Users are able to access almost anything they can imagine without having to worry about the government controlling what they can and cannot see. In Thailand the Internet was pretty much the same aside from a ban on pornography and slander of government officials. However, censorship…
Your identity may be worth the world to you but it’s being shopped around for less on the Dark Web. According to new reports, your identity is being old for as little as $1.
Your fingerprint is essentially one of the most personal forms of identification you hold outside of your DNA. That’s why OPM’s admission of 5.6 million fingerprints lost in the U.S. federal employee breach is so scary. If you’re a victim of identity theft everything is copesthetic; it’s easy to get your info back. Your fingerprint on the other hand, is…
When Apple’s App Store saw an influx of XcodeGhost Apps the company, once known for their seemingly impenetrable security, seemed to have finally had a weakness exploited. While the infected apps aren’t “security-invading malware,” the problem seems to be more plentiful that originally reports suggested.
New reports are suggesting that a security flaw in SAP AG’s Afaria mobile management system could allow hackers to wipe mobile devices; an action that’s only taken by companies for consumers who have lost their devices or had them stolen.
Drones are seemingly very easy to get your hands on but government drones contain a level of secrecy and ingenuity that your regular market can’t provide. However, the big question here is how are government drones being used? A group of hackers looks to spy on drone with a balloon that will be launched as far as the stratosphere.
In attempts to crack down on cybersecurity, the Indian Department of Electronics and Information Technology created a legislation which includes banning users from deleting information stored on their devices before a 90 day period.
China and the U.S. are in talks to come up with a deal that may limit cyberweapon attacks which could lead to “the first-ever arms-control deal for cyberspace,” according to new reports.