Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Twitter warned that a bug in Twitter for iOS led to the company inadvertently collecting location data and sharing it with a third-party. [Read More]
New Citizens Lab report details Iran-linked multilingual campaign aimed at seeding anti-Saudi, anti-Israel and anti-American stories across the internet. [Read More]
Facebook patches a serious WhatsApp zero-day vulnerability (CVE-2019-3568) that can and has been exploited to remotely install spyware on phones by calling the targeted device. [Read More]
There is a growing number of cases highlighting how key evidence needed to solve crimes could sit in computers a continent away under completely different legal jurisdiction. [Read More]
A former government intelligence analyst has been charged with leaking classified documents about military campaigns against terrorist group al-Qaeda to a reporter. [Read More]
Freedom Mobile, Canada's fourth largest mobile network operator, leaked the details of many customers, including their contact information, date of birth, and payment card data. [Read More]
Experts called on 5G providers Friday to heed supply chain security in light of concerns about technology providers such as China's Huawei, recently banned by the US government. [Read More]
Chinese authorities are using a mobile app designed for mass surveillance to profile, investigate and detain Muslims in Xinjiang by labelling "completely lawful" behaviour as suspicious, a Human Rights Watch report said. [Read More]
Facebook is launching a major redesign of its app and website built around letting people connect with groups that share their interests — an attempt to shift its focus away from the untrammeled public sharing that has helped spread hate speech, extremism, misinformation and livestreamed video of massacres. [Read More]
Apple claims it recently removed several parental control applications from the App Store due to their use of “highly invasive” mobile device management (MDM) technology. [Read More]

FEATURES, INSIGHTS // Privacy

rss icon

Preston Hogue's picture
You should be asking yourself what your digital vapor trail says about you and its potential impact on your own reputation and the trust others have in you.
Preston Hogue's picture
In the United States, it is consumers’ responsibility to opt out of sharing their information with the services they join—and figuring out how to do so.
Preston Hogue's picture
There have been so many high-profile breaches that a person’s entire life could be laid out, triangulated and, ultimately, faked by someone with the wrong set of intentions.
Ashley Arbuckle's picture
Ashley Arbuckle interviews Michelle Dennedy, Cisco’s Chief Privacy Officer (CPO), to discuss how data privacy has a major impact on business.
Preston Hogue's picture
It’s a good reminder that communications in cyberspace can have a long shelf life that both individuals and organizations would be wise to consider.
Laurence Pitt's picture
ePrivacy takes GDPR's approach a step further by ensuring personal and family privacy in relation to data collection, storage and usage.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Lance Cottrell's picture
Even while using Tor hidden services, there are still many ways you can be exposed and have your activities compromised if you don’t take the right precautions.
Travis Greene's picture
GDPR is proving disruptive for European citizens who are no longer able to interact with services from outside the EU. And the compliance costs can be significant as well. But are there legitimate concerns of overreach?
Lance Cottrell's picture
Failing to consistently use identity hiding technologies is the most common way to blow your online cover. Just one failure to use your misattribution tools can instantly connect your alias to your real identity.