Join my exclusive Dead Drop Digest with the most popular spy stories, tips, & tricks.

close
Breaking news

A Russia-linked cyber-espionage group has hacked into the controls of electricit...read more What is metadata, how is it used and why is it important? When we interact over ...read more Mass surveillance is the subjection of a population or significant component of ...read more

How covert agents infiltrate the internet to manipulate, deceive, and destroy reputations

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a...

Cyber sleuth says there is a HUGE demand for password stealing apps from ‘dads, husbands and wives’

THERE has been a surge in the number of nosy parkers who ask IT experts to crack into their loved one’s social media accounts, a cyber sleuth has revealed. The expert, known only as MalwareHunter, is a security researcher at MalwareHunterTeam and has spoken...

How covert agents infiltrate the internet to manipulate, deceive, and destroy reputations

One of the many pressing stories that remains to be told from the Snowden archive is how western int...

Data breach trends

​Early in the afternoon on May 12, 2017, the United Kingdom’s National Health Service (NHS) conf...

Issues of Privacy in The Digital World

The modern world has immensely gifted with the modern technology, the digital world is the best crea...

This is what Cyber Criminals are really after

The term “security by obscurity” implies that the less popular and attention grabbing yo...

Foscam USA issues a cyber security alert to all its users

Chinese company Foscam has warned all its remote controlled CCTV camera users about a flaw which whe...

Cyber-spies are adding to difficult world for intelligence agencies, says former security chief

Former MI5 chief says cyber-espionage and the balance between security and privacy means ‘we&#...

NIST Reveals Draft of Cybersecurity Framework

  Industry experts and federal employees met at a workshop hosted this week at the National Ins...

The Switch German researchers discover a flaw that could let anyone listen to your cell calls.

German researchers have discovered security flaws that could let hackers, spies and criminals listen...