You might be interested in …

[ThreatPost] A Guide to Doing Cyberintelligence on a Restricted Budget

All posts, ThreatPost

Cybersecurity budget cuts are everywhere. Chad Anderson, senior security researcher at DomainTools, discusses alternatives to fancy tooling, and good human skills alignment. Source: Read More (Threatpost)

Read More

[HackerNews] WhatsApp to Finally Let Users Encrypt Their Chat Backups in the Cloud

All posts, HackerNews

WhatsApp on Friday announced it will roll out support for end-to-end encrypted chat backups on the cloud for Android and iOS users, paving the way for storing information such as chat messages and photos in Apple iCloud or Google Drive in a cryptographically secure manner. The feature, which will go live to all of its two billion […]

Read More

[ThreatPost] Researchers: NSO Group’s Pegasus Spyware Should Spark Bans, Apple Accountability

All posts, ThreatPost

Our roundtable of experts weighs in on implications for Apple and lawmakers in the wake of the bombshell report showing widespread surveillance of dissidents, journalists and others. Source: Read More (Threatpost)

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.