Skip to content
  • News
    • TNW Conference June 19 & 20, 2025
    • All events
  • Spaces
  • Programs

  • Newsletters
  • Partner with us
  • Jobs
  • Contact
News news news news
  • Latest
  • Deep tech
  • Sustainability
  • Ecosystems
  • Data and security
  • Fintech and ecommerce
  • Future of work
  • Conference media hub
    • Startups and technology
    • Investors and funding
    • Government and policy
    • Corporates and innovation
    • Podcast

Security

    Pegasus isn’t all you have to worry about: Meet Cytrox’s spyware, Predator

    Pegasus isn’t all you have to worry about: Meet Cytrox’s spyware, Predator

    • Ivan Mehta
    • 3 years ago
    The Log4j bug exposes a bigger issue: Open-source funding (Updated)

    The Log4j bug exposes a bigger issue: Open-source funding (Updated)

    • Ivan Mehta
    • 3 years ago
    You’re just as good as a cybersecurity expert at spotting a phishing email

    You’re just as good as a cybersecurity expert at spotting a phishing email

    • The Conversation
    • 3 years ago
    Could open banking pose new security threats to your financial data? We asked an expert

    Could open banking pose new security threats to your financial data? We asked an expert

    • Emily DSilva
    • 3 years ago
    Google is automatically turning on 2FA — how to check your settings

    Google is automatically turning on 2FA — how to check your settings

    • Ivan Mehta
    • 3 years ago
    How cultural differences shape online underground marketplaces

    How cultural differences shape online underground marketplaces

    • Ivan Mehta
    • 3 years ago
    QR codes could be the next target for cybercriminals — here’s how to protect yourself

    QR codes could be the next target for cybercriminals — here’s how to protect yourself

    • Anna Chung
    • 3 years ago
    How do we improve cybersecurity? By copying our body’s immune system

    How do we improve cybersecurity? By copying our body’s immune system

    • Saidat Giwa-Osagie
    • 3 years ago
    Xiaomi has the power to censor your phone, report claims

    Xiaomi has the power to censor your phone, report claims

    • Callum Booth
    • 3 years ago
    Computer vision can help spot cyber threats with startling accuracy

    Computer vision can help spot cyber threats with startling accuracy

    • Ben Dickson
    • 3 years ago
    Previous Page Next Page

    Popular articles

    1. 1

      Listen to the ‘world’s first’ song made by a quantum computer and AI

    2. 2

      New exoskeleton for humans comes with AI brain — and muscle memory

    3. 3

      Elon Musk’s Grok chatbot banned by a quarter of European firms

    4. 4

      New TNW Backstage podcast explores privacy tensions and Meta’s model

    5. 5

      Can geothermal startups drill Europe to clean energy independence?

The heart of tech


More TNW

  • Media
  • Events
  • Programs
  • Spaces
  • Newsletters
  • Jobs in tech

About TNW

  • Partner with us
  • Jobs
  • Terms & Conditions
  • Cookie Statement
  • Privacy Statement
  • Editorial Policy
  • Masthead

Copyright © 2006—2025, The Next Web B.V. Made with <3 in Amsterdam.