Skip to content
  • News
    • TNW Conference June 19 & 20, 2025
    • All events
  • Spaces
  • Programs

  • Newsletters
  • Partner with us
  • Jobs
  • Contact
🎉  This is your FINAL chance to SAVE 💸 Prices increase in... 00d 00h 00m 00s  Register now
News topic topic topic
🎉  This is your FINAL chance to SAVE 💸 Prices increase in... 00d 00h 00m 00s  Register now
  • Latest
  • Deep tech
  • Sustainability
  • Ecosystems
  • Data and security
  • Fintech and ecommerce
  • Future of work
  • Conference media hub
    • Startups and technology
    • Investors and funding
    • Government and policy
    • Corporates and innovation
    • Podcast

Security

    Pegasus isn’t all you have to worry about: Meet Cytrox’s spyware, Predator

    Pegasus isn’t all you have to worry about: Meet Cytrox’s spyware, Predator

    • Ivan Mehta
    • 3 years ago
    The Log4j bug exposes a bigger issue: Open-source funding (Updated)

    The Log4j bug exposes a bigger issue: Open-source funding (Updated)

    • Ivan Mehta
    • 3 years ago
    You’re just as good as a cybersecurity expert at spotting a phishing email

    You’re just as good as a cybersecurity expert at spotting a phishing email

    • The Conversation
    • 3 years ago
    Could open banking pose new security threats to your financial data? We asked an expert

    Could open banking pose new security threats to your financial data? We asked an expert

    • Emily DSilva
    • 3 years ago
    Google is automatically turning on 2FA — how to check your settings

    Google is automatically turning on 2FA — how to check your settings

    • Ivan Mehta
    • 3 years ago
    How cultural differences shape online underground marketplaces

    How cultural differences shape online underground marketplaces

    • Ivan Mehta
    • 3 years ago
    QR codes could be the next target for cybercriminals — here’s how to protect yourself

    QR codes could be the next target for cybercriminals — here’s how to protect yourself

    • Anna Chung
    • 3 years ago
    How do we improve cybersecurity? By copying our body’s immune system

    How do we improve cybersecurity? By copying our body’s immune system

    • Saidat Giwa-Osagie
    • 3 years ago
    Xiaomi has the power to censor your phone, report claims

    Xiaomi has the power to censor your phone, report claims

    • Callum Booth
    • 3 years ago
    Computer vision can help spot cyber threats with startling accuracy

    Computer vision can help spot cyber threats with startling accuracy

    • Ben Dickson
    • 3 years ago
    Previous Page Next Page

    Popular articles

    1. 1

      Listen to the ‘world’s first’ song made by a quantum computer and AI

    2. 2

      This flying sportscar is set to go on sale next year — for $1M

    3. 3

      Exclusive: Latvian startup launches autonomous drone killer for NATO armies

    4. 4

      New TNW Backstage podcast explores privacy tensions and Meta’s model

    5. 5

      ‘Untappable’ encryption edges closer after quantum messaging breakthrough

The heart of tech


More TNW

  • Media
  • Events
  • Programs
  • Spaces
  • Newsletters
  • Jobs in tech

About TNW

  • Partner with us
  • Jobs
  • Terms & Conditions
  • Cookie Statement
  • Privacy Statement
  • Editorial Policy
  • Masthead

Copyright © 2006—2025, The Next Web B.V. Made with <3 in Amsterdam.