Skip to content
  • News
    • TNW Conference June 19 & 20, 2025
    • All events
  • Spaces
  • Programs

  • Newsletters
  • Partner with us
  • Jobs
  • Contact
🎉  TNW Conference is just around the corner ⏰ Secure your tickets 00d 00h 00m 00s  Register now
News news news news
🎉  TNW Conference is just around the corner ⏰ Secure your tickets 00d 00h 00m 00s  Register now
  • Latest
  • Deep tech
  • Sustainability
  • Ecosystems
  • Data and security
  • Fintech and ecommerce
  • Future of work
  • Conference media hub
    • Startups and technology
    • Investors and funding
    • Government and policy
    • Corporates and innovation
    • Podcast

Security

    Pegasus isn’t all you have to worry about: Meet Cytrox’s spyware, Predator

    Pegasus isn’t all you have to worry about: Meet Cytrox’s spyware, Predator

    • Ivan Mehta
    • 3 years ago
    The Log4j bug exposes a bigger issue: Open-source funding (Updated)

    The Log4j bug exposes a bigger issue: Open-source funding (Updated)

    • Ivan Mehta
    • 3 years ago
    You’re just as good as a cybersecurity expert at spotting a phishing email

    You’re just as good as a cybersecurity expert at spotting a phishing email

    • The Conversation
    • 3 years ago
    Could open banking pose new security threats to your financial data? We asked an expert

    Could open banking pose new security threats to your financial data? We asked an expert

    • Emily DSilva
    • 3 years ago
    Google is automatically turning on 2FA — how to check your settings

    Google is automatically turning on 2FA — how to check your settings

    • Ivan Mehta
    • 3 years ago
    How cultural differences shape online underground marketplaces

    How cultural differences shape online underground marketplaces

    • Ivan Mehta
    • 3 years ago
    QR codes could be the next target for cybercriminals — here’s how to protect yourself

    QR codes could be the next target for cybercriminals — here’s how to protect yourself

    • Anna Chung
    • 3 years ago
    How do we improve cybersecurity? By copying our body’s immune system

    How do we improve cybersecurity? By copying our body’s immune system

    • Saidat Giwa-Osagie
    • 3 years ago
    Xiaomi has the power to censor your phone, report claims

    Xiaomi has the power to censor your phone, report claims

    • Callum Booth
    • 3 years ago
    Computer vision can help spot cyber threats with startling accuracy

    Computer vision can help spot cyber threats with startling accuracy

    • Ben Dickson
    • 3 years ago
    Previous Page Next Page

    Popular articles

    1. 1

      World’s biggest sand battery to heat Finnish town without fossil fuels

    2. 2

      New exoskeleton for humans comes with AI brain — and muscle memory

    3. 3

      EU approves first mixed reality flight simulator for pilot training

    4. 4

      ‘Purest meat alternative’ to grow in Swedish mycoprotein factory

    5. 5

      ‘World’s first’ autofocus glasses could spell the end of reading specs

The heart of tech


More TNW

  • Media
  • Events
  • Programs
  • Spaces
  • Newsletters
  • Jobs in tech

About TNW

  • Partner with us
  • Jobs
  • Terms & Conditions
  • Cookie Statement
  • Privacy Statement
  • Editorial Policy
  • Masthead

Copyright © 2006—2025, The Next Web B.V. Made with <3 in Amsterdam.