Devo Technology, a late-stage startup building technology for data logging and security analytics, has closed a new $100 million funding round that pushes its valuation in the $2 billion range. [Read More]
Bug hunters at Microsoft are calling attention to several high-severity vulnerabilities in a mobile framework used by carriers in pre-installed Android System apps. [Read More]
witter will pay a $150 million penalty and put in new safeguards to settle federal regulators’ allegations that the social platform failed to protect the privacy of users’ data over a six-year span. [Read More]
The District of Columbia sued Meta chief Mark Zuckerberg, seeking to hold him personally liable for the Cambridge Analytica scandal, a privacy breach of millions of Facebook users’ personal data. [Read More]
The UK Information Commissioner’s Office has fined facial recognition database firm Clearview AI more than £7.5 million for breaching the UK GDPR. [Read More]
Researchers at NCC Group create a tool for conducting a new type of Bluetooth Low Energy (BLE) relay attack that bypasses existing protections. [Read More]
Texas startup Balkan ID banks $5.75 million in seed funding to help organizations find and remediate risky privileges across SaaS and public cloud infrastructure. [Read More]
Adobe ships patches for at least 18 serious security defects in multiple enterprise-facing products and warned that unpatched systems are at risk of remote code execution attacks [Read More]
Startup Clearview AI has agreed to limit access to its controversial facial recognition database in the United States, settling a lawsuit filed by privacy advocates, a court filing showed. [Read More]
Even while using Tor hidden services, there are still many ways you can be exposed and have your activities compromised if you don’t take the right precautions.
GDPR is proving disruptive for European citizens who are no longer able to interact with services from outside the EU. And the compliance costs can be significant as well. But are there legitimate concerns of overreach?
Failing to consistently use identity hiding technologies is the most common way to blow your online cover. Just one failure to use your misattribution tools can instantly connect your alias to your real identity.
With each new digital industry, process or service comes a new data source that can be compiled and cross referenced, introducing new ways to see into people’s lives, activities and business operations.
Facial recognition systems are becoming cheaper, better, easier to use, and more widely deployed, while social media platforms are creating an ocean of easily identifiable faces that are widely accessible.
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.