Skip to content
  • News
    • TNW Conference June 19 & 20, 2025
    • All events
  • Spaces
  • Programs

  • Newsletters
  • Partner with us
  • Jobs
  • Contact
News news news news
  • Latest
  • Deep tech
  • Sustainability
  • Ecosystems
  • Data and security
  • Fintech and ecommerce
  • Future of work
  • Conference media hub
    • Startups and technology
    • Investors and funding
    • Government and policy
    • Corporates and innovation
    • Podcast

Security

    Pegasus isn’t all you have to worry about: Meet Cytrox’s spyware, Predator

    Pegasus isn’t all you have to worry about: Meet Cytrox’s spyware, Predator

    • Ivan Mehta
    • 3 years ago
    The Log4j bug exposes a bigger issue: Open-source funding (Updated)

    The Log4j bug exposes a bigger issue: Open-source funding (Updated)

    • Ivan Mehta
    • 3 years ago
    You’re just as good as a cybersecurity expert at spotting a phishing email

    You’re just as good as a cybersecurity expert at spotting a phishing email

    • The Conversation
    • 3 years ago
    Could open banking pose new security threats to your financial data? We asked an expert

    Could open banking pose new security threats to your financial data? We asked an expert

    • Emily DSilva
    • 3 years ago
    Google is automatically turning on 2FA — how to check your settings

    Google is automatically turning on 2FA — how to check your settings

    • Ivan Mehta
    • 3 years ago
    How cultural differences shape online underground marketplaces

    How cultural differences shape online underground marketplaces

    • Ivan Mehta
    • 3 years ago
    QR codes could be the next target for cybercriminals — here’s how to protect yourself

    QR codes could be the next target for cybercriminals — here’s how to protect yourself

    • Anna Chung
    • 3 years ago
    How do we improve cybersecurity? By copying our body’s immune system

    How do we improve cybersecurity? By copying our body’s immune system

    • Saidat Giwa-Osagie
    • 3 years ago
    Xiaomi has the power to censor your phone, report claims

    Xiaomi has the power to censor your phone, report claims

    • Callum Booth
    • 3 years ago
    Computer vision can help spot cyber threats with startling accuracy

    Computer vision can help spot cyber threats with startling accuracy

    • Ben Dickson
    • 3 years ago
    Previous Page Next Page

    Popular articles

    1. 1

      The Hot Crazy Matrix explains why investors get tech deals wrong

    2. 2

      Opinion: Trusting an unverified AI agent is like handing your keys to a drunk graduate

    3. 3

      Bananas, champagne, and robots: Why automation still needs humans

    4. 4

      Vibe coding is transforming software. Enterprise is the next frontier

    5. 5

      European space tech has data to sell — but where are the buyers?

The heart of tech


More TNW

  • Media
  • Events
  • Programs
  • Spaces
  • Newsletters
  • Jobs in tech

About TNW

  • Partner with us
  • Jobs
  • Terms & Conditions
  • Cookie Statement
  • Privacy Statement
  • Editorial Policy
  • Masthead

Copyright © 2006—2025, The Next Web B.V. Made with <3 in Amsterdam.