SS7, telecoms’ largest security hole
The SS7 protocol was created in 1975, and has hardly been updated since, which means that it lacks sufficient security for those that make use of it.
Is it possible to ensure the privacy of electronic voting?
On May 23, the Panda Security Summit 2019 (#PASS2019) will discuss the keys to protecting against cyberattacks on public administrations.
Have hackers tapped your phone?
Personal information is so valuable that criminals will try and steal it from anywhere. And listening into your phone calls is another way to do that.
Article 13, Copyright and Internet Freedom
A major change to copyright law in the European Union has raised new questions about internet free
Was Amazon’s Jeff Bezos Hacked?
Bezos’ security chief wrote an article in The Daily Beast this week asserting that Bezos’ phone had been compromised by the Saudis, possibly in collusion with Enquirer publisher American Media Inc.
TEMPEST and EMSEC: Is it possible to use electromagnetic waves in cyberattacks?
TEMPEST is a code name that refers to research and studies about unintentional emanations from electronic devices that can leak classified information.
10 Social Media Scams and How to Spot Them
It’s no secret that people love social media. Whether it’s Facebook which has over 2 billion active users as of October 2018, Instagram with its…