Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Implementation bug allowed an attacker to create 370,000 Zcoins and make a profit of over $400,000 [Read More]
German regulators have banned an internet-connected doll called "My Friend Cayla" that can chat with children, warning Friday that it was a de facto "spying device". [Read More]
Amnesty International has analyzed a sophisticated phishing campaign targeting human rights activists in Qatar and Nepal [Read More]
US embassies could ask visa applicants for passwords to their own social media accounts in future background checks, Homeland Security Secretary John Kelly said Tuesday. [Read More]
Researchers found 76 popular iOS applications that allow attackers to silently intercept TLS-protected data [Read More]
Facebook proposes new method for recovering accounts when users forget their passwords or their credentials get compromised [Read More]
U.S. President Donald Trump's executive order titled 'Enhancing Public Safety in the Interior of the United States' appears to threaten the future of the EU/US Privacy Shield, but that may not be the case. [Read More]
Rumors circulating on hacker forums claim the controversial LeakedSource website was shut down following a law enforcement raid [Read More]
Researchers analyzed 283 Android VPN applications from Google Play and found that many of them introduce security and privacy risks [Read More]
The popular darknet marketplace AlphaBay was until recently affected by a vulnerability that exposed its users’ private messages [Read More]

FEATURES, INSIGHTS // Privacy

rss icon

Ram Mohan's picture
There is a lot we can do to keep our data private and, like many aspects of managing security, it’s a process that is best grounded in common sense. What can organizations do to shield themselves from the kind of scrutiny that has caught the world’s attention recently?
Michael Callahan's picture
There’s more than functionality and availability issues ailing Healthcare.gov. There’s significant potential for compromise.
Gant Redmon's picture
In today's world, people are screaming “Privacy!” but it’s confusing who they’re screaming at. That’s why I thought I’d pen a timely guide to the current privacy outrage. Confusion stems from there being four plot lines going at the same time.
Mike Tierney's picture
It is difficult to argue against the fact that in today's world organizations need to deploy at least some level of activity monitoring to protect themselves against the insider threat, other cyber risks and productivity loss.
Gant Redmon's picture
While you can’t do anything about the terms when using a product or service, you can decide whether or not to get into the contractual relationship in the first place and what information you share if you do click through.
Oliver Rochford's picture
As the “Snowden leaks” continue in their revelations and unraveling of the twisted web of government surveillance, it is becoming clear that the foundation of trust in the Internet as a shared commons has been thoroughly undermined.
Gant Redmon's picture
Parenting, much like our legal system, is founded on three basic steps: 1) establish rules, 2) monitor compliance, and 3) modify non-compliant behavior.
Gant Redmon's picture
In the spirit of "trust but verify", you may occasionally scroll through your kid’s email or Google+ account, or pick up their phone to glance at recent texts. One would think this behavior it protected by law. Surprisingly, wiretap laws don’t have carve outs for parental snooping.
Gant Redmon's picture
By comparing what was creepy a few years back with what is creepy today and asking “why the change,” we will see the commonalities of creepiness and lessons for all who wish to make a successful business involving personal information.
Gant Redmon's picture
The CSO is so critical for the CPO’s success that I guarantee that if you send this article to your CPO, they will take you out for a free lunch the next day.