Security Experts:

long dotted


Federal regulators sued Kochava Inc., accusing the data broker of selling sensitive geolocation data from millions of mobile devices that can be used to identify people and track their movements. [Read More]
Meta reached a tentative settlement in a lawsuit alleging that Facebook allowed millions of its users’ personal information to be fed to Cambridge Analytica, a firm that supported Donald Trump’s victorious presidential campaign in 2016. [Read More]
Texas startup BalkanID scores additional financing for technology in the Identity Governance and Administration (IGA) space. [Read More]
Sephora Inc., one of the world’s largest cosmetics retailers, has settled a lawsuit claiming that the company sold customer information without proper notice in violation of the California’s landmark consumer privacy law. [Read More]
Google is breaking EU law by sending users of its email service Gmail direct advertising messages, activists said in a complaint sent to French regulators. [Read More]
Streaming media startup Plex is scrambling to reset user passwords after a database hack that included the theft of emails, usernames, and encrypted passwords. [Read More]
A privacy class action lawsuit filed in the Northern District of California claims Oracle has built a worldwide surveillance machine. [Read More]
Remote code execution vulnerability fixed in GitLab Community Edition (CE) and Enterprise Edition (EE) updates. [Read More]
Novant Health has notified more than 1.3 million individuals that protected health information may have been inadvertently exposed to Facebook parent company Meta. [Read More] is a free and open source tool that shows what JavaScript code is injected into websites by in-app browsers. [Read More]


rss icon

Preston Hogue's picture
It’s a good reminder that communications in cyberspace can have a long shelf life that both individuals and organizations would be wise to consider.
Laurence Pitt's picture
ePrivacy takes GDPR's approach a step further by ensuring personal and family privacy in relation to data collection, storage and usage.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Lance Cottrell's picture
Even while using Tor hidden services, there are still many ways you can be exposed and have your activities compromised if you don’t take the right precautions.
Travis Greene's picture
GDPR is proving disruptive for European citizens who are no longer able to interact with services from outside the EU. And the compliance costs can be significant as well. But are there legitimate concerns of overreach?
Lance Cottrell's picture
Failing to consistently use identity hiding technologies is the most common way to blow your online cover. Just one failure to use your misattribution tools can instantly connect your alias to your real identity.
Preston Hogue's picture
With each new digital industry, process or service comes a new data source that can be compiled and cross referenced, introducing new ways to see into people’s lives, activities and business operations.
Lance Cottrell's picture
Facial recognition systems are becoming cheaper, better, easier to use, and more widely deployed, while social media platforms are creating an ocean of easily identifiable faces that are widely accessible.
Steven Grossman's picture
How can a company protect its information and operations without running askew of data privacy laws and the concerns of its customers?
Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.