Netherlands Court Scraps Law to Save Privacy

A judge in The Hague, Netherlands has changed the law on data retention as it not only served crime prevention but it was also deemed an intrusion on privacy for citizens. The Data Retention Law required both telephone companies and internet service providers to hold records on customer’s information for up to a year. Landlines

Read More...

Apple and Google Users Could Be Open to Attack

The security flaw known as “FREAK Attack” has been discovered in Apple and Google devices, it becomes apparent whilst users are browsing the net. Research experts have pinned the blame on a decade old policy, that has long since been altered. This policy required US manufacturers to release weaker encryption systems when sold overseas, that was apparently

Read More...

Fraudsters Targeting Apple Pay

With the introduction of Apple’s new simple paying system, vulnerabilities have been discovered in the system which has lead to fraudster’s targeting Apple Pay. The new quick and easy mobile way of paying for items is usually secured by requiring fingerprint recognition on iPhones. But the issue now is that these hackers have found a

Read More...

Hackers Steal Over $1billion in Online Bank Thefts

In one of the largest scale bank thefts recorded, hackers steal over $1Billion in online bank thefts from more than 100 banks throughout the world. Russian security firm Kaspersky reported the breach as it was learned that the hacking ring has been active since at least 2013. It is believed that more than 100 banks in

Read More...

Protect Yourself Online with Le VPN

With all the cases of stolen data, hacked systems and security breaches that have been happening more and more frequently, it definitely pays to start monitoring your own safety online. Attacks can happen anywhere and you wouldn’t even know when they happen. Learn to protect yourself online with Le VPN. When you use the internet, you

Read More...

The World’s Weakest Passwords Revealed

Security company SplashData has released its annual chart detailing a list of the worst possible passwords to use. The world’s weakest passwords revealed and it is quite unbelievable at passwords still being widely used online. The list is also a way to teach internet users simple passwords not to use, as well as the types of passwords which are not

Read More...

Hacking Leads to Physical Damage

In only the second time in history, a cyber attack has lead to actual damage at a steel mill in Germany at the end of last year. The attack on a steel mill left the plant with huge amounts of damage after hackers remotely accessed the control systems that controlled the blast furnace. The attack meant that

Read More...

Hacker Steals Fingerprint From Picture

Even though Passwords can prove useful in protecting our data, they can also be frustrating to remember, not to mention relatively easy for hackers to crack. Alternatives are being explored to replace the trusted security measure. One such alternative is fingerprint scanning technology which has been in use for many years already and even included in

Read More...

The Biggest Software Bugs of 2014

2014 wasn’t a great year for online security, this year had an alarming number of serious bugs. Even as security experts and companies were developing stronger safeguards against hackers and malware, bugs were being discovered in old code and software, long forgotten about. So why was 2014 so bad for bugs? A look at the biggest software

Read More...

Hackers Could Use Radio Signals to Steal Data

Some of the world’s most sensitive data is not stored on the internet, nor does it even have access to the internet, the computers they exist on are completely isolated from other machines. This precaution is a way to prevent any form of remote hack or security breach. These systems are referred to as isolated machines,

Read More...