Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Unprotected Cisco WebEx and Zoom meetings can be easily accessed by malicious actors due to an API enumeration vulnerability dubbed Prying-Eye. [Read More]
Online companies in the EU can no longer present internet users with a pre-checked box telling them cookies will be planted on their smartphone or computer if they don't deselect the option, under a ruling issued Tuesday. [Read More]
BlackBerry announces launch of Advanced Technology Development Labs, a new R&D business unit focusing on cybersecurity. [Read More]
A Spanish private security firm, which is under investigation in Madrid, spied on Wikileaks founder Julian Assange on behalf of the CIA while he was inside the Ecudoran embassy in London. [Read More]
Apple releases security updates for iOS 13 and iPadOS to address a vulnerability that allows third-party keyboard extensions to gain “full access” without being granted permission. [Read More]
Dunkin' Donuts sued by New York's State Attorney General over data breaches that took place in 2015 and 2018. [Read More]
Apple will soon patch a bug in iOS 13 and iPadOS that gives “full access” permissions to third-party keyboard apps without the user’s approval. [Read More]
Google is not required to apply an EU "right to be forgotten" to its search engine domains outside Europe, the EU's top court ruled Tuesday in a landmark decision. [Read More]
Facebook said it suspended "tens of thousands" of apps on its platform as a result of its review on privacy practices launched following the scandal involving Cambridge Analytica. [Read More]
France has not changed its mind on rejecting any asylum request from US surveillance whistleblower Edward Snowden, its foreign minister said Thursday, after the former CIA employee said he would like sanctuary in the country. [Read More]

FEATURES, INSIGHTS // Privacy

rss icon

Lance Cottrell's picture
Even while using Tor hidden services, there are still many ways you can be exposed and have your activities compromised if you don’t take the right precautions.
Travis Greene's picture
GDPR is proving disruptive for European citizens who are no longer able to interact with services from outside the EU. And the compliance costs can be significant as well. But are there legitimate concerns of overreach?
Lance Cottrell's picture
Failing to consistently use identity hiding technologies is the most common way to blow your online cover. Just one failure to use your misattribution tools can instantly connect your alias to your real identity.
Preston Hogue's picture
With each new digital industry, process or service comes a new data source that can be compiled and cross referenced, introducing new ways to see into people’s lives, activities and business operations.
Lance Cottrell's picture
Facial recognition systems are becoming cheaper, better, easier to use, and more widely deployed, while social media platforms are creating an ocean of easily identifiable faces that are widely accessible.
Steven Grossman's picture
How can a company protect its information and operations without running askew of data privacy laws and the concerns of its customers?
Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.
Lance Cottrell's picture
By surreptitiously monitoring and engaging with potential attackers and malware developers you can successfully gain information about emerging attack methods, patterns, and practices in the cyber underground.
Jim Ivers's picture
With the advent of connected devices, privacy and security have become tightly linked because theft of private data is often the goal of malicious attacks.
Jim Ivers's picture
Enlightened toy manufacturers likely begin to embrace the basic concepts of IoT security and build connected toys that can be trusted by parents.