Security Experts:

long dotted


Since mid-September, at least nine global entities across multiple sectors were compromised in attacks exploiting a ManageEngine ADSelfService Plus security flaw. [Read More]
Electronic Warfare Associates said its email system was compromised in August by hackers who stole social security numbers and other personally identifiable information. [Read More]
The $10 million Series A funding round was led by Gula Tech Ventures and Paladin Capital Group [Read More]
Facebook said it will shut down its face-recognition system and delete the faceprints of more than 1 billion people. [Read More]
The privacy-focused messaging platform explains how it thwarts spam without access to the contents of encrypted messages. [Read More]
Companies in China would need government approval to transfer important data abroad under proposed rules that would tighten Beijing's control over information and might disrupt operations for international corporations. [Read More]
The end-to-end encrypted, privacy-focused communication service says it can only provide account creation and last connection timestamps. [Read More]
Private Set Membership (PSM) is meant to ensure privacy during specific client queries, such as when a user checks whether a specific item is present within a database. [Read More]
Google is partnering with multiple big-tech partners on a Minimum Viable Secure Product baseline aimed at building a set of minimum security requirements for business applications and services. [Read More]
Apple ships iOS 15.1 with patches for gaping security holes in a wide range of mobile software components. [Read More]


rss icon

Preston Hogue's picture
It’s a good reminder that communications in cyberspace can have a long shelf life that both individuals and organizations would be wise to consider.
Laurence Pitt's picture
ePrivacy takes GDPR's approach a step further by ensuring personal and family privacy in relation to data collection, storage and usage.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Lance Cottrell's picture
Even while using Tor hidden services, there are still many ways you can be exposed and have your activities compromised if you don’t take the right precautions.
Travis Greene's picture
GDPR is proving disruptive for European citizens who are no longer able to interact with services from outside the EU. And the compliance costs can be significant as well. But are there legitimate concerns of overreach?
Lance Cottrell's picture
Failing to consistently use identity hiding technologies is the most common way to blow your online cover. Just one failure to use your misattribution tools can instantly connect your alias to your real identity.
Preston Hogue's picture
With each new digital industry, process or service comes a new data source that can be compiled and cross referenced, introducing new ways to see into people’s lives, activities and business operations.
Lance Cottrell's picture
Facial recognition systems are becoming cheaper, better, easier to use, and more widely deployed, while social media platforms are creating an ocean of easily identifiable faces that are widely accessible.
Steven Grossman's picture
How can a company protect its information and operations without running askew of data privacy laws and the concerns of its customers?
Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.