Join my exclusive Dead Drop Digest with the most popular spy stories, tips, & tricks.

close
Breaking news

A Russia-linked cyber-espionage group has hacked into the controls of electricit...read more What is metadata, how is it used and why is it important? When we interact over ...read more Mass surveillance is the subjection of a population or significant component of ...read more There’s a good chance you were affected by the Equifax hack of 143 million nam...read more Facebook has the ability to spy on users in their homes and offices because of...read more

What happens if a cop forces you to unlock your iPhone X with your face?

Imagine you’ve been detained at customs, waiting to cross the border. Or maybe you’ve been pulled over for a traffic violation. An officer waves your cellphone at you. “Look at this. Is this yours?” he asks. Before you can respond, a tiny i...

Virtual and Cyber Crime: Security Threats

Technology represents a new area of security threats. The danger of identity theft, cyber crime, and other forms of electronic and virtual security threats constitute a very real and pressing danger for many people and governments. Ultius publishes regular se...

Amazon Key door-entry flaw: No easy fix to stop rogue couriers burgling your place unseen

Analysis Amazon has pushed out an emergency security update to its door-unlocking system called Key...

Face to face with Nest’s smartest home security camera

Nest’s new home security camera is supposed to be so smart that it can identify people it’s been...

What are the security risks of wireless Qi charging ?

It is well known that plugging your mobile device for charging in public/uncontrolled places throug...

Why you should be using a password manager

Every few weeks, we hear the news that another major website has been hacked. Often these hacks mean...

Hackers have successfully hidden malware in popular PC cleanup tool

CBS Local — A computer program used to help your PC run faster has reportedly become the latest v...

Researchers develop glasses to protect you from facial recognition

Facial recognition software is cropping up everywhere, so it was only a matter of time before anti...

Secure communication strategies in plain sight: part 1

Even though Communication Preparedness is one of the Ten Principles of Preparedness, it tends to be ...

Checkmate to danger: here’s how to always win!

Have you ever thought how reading your emails in a public place reduces your chances to react and de...