Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The US Supreme Court on Monday declined to consider an appeal by Facebook that would have derailed a $15 billion lawsuit over whether it illegally tracked users about a decade ago. [Read More]
Even agencies that sanitize PDFs before publishing fail to properly remove all of the targeted information. [Read More]
Data privacy management company DataGrail raises $30 million in a Series B funding round. [Read More]
Civil liberties activists are suing a company that provides facial recognition services to law enforcement agencies and private companies around the world, contending that Clearview AI illegally stockpiled data on 3 billion people without their knowledge or permission. [Read More]
Patient data protection provider Tausight banked $20 million in Series A funding and announced plans to invest in a healthcare-specific solution designed to identify security flaws in clinical workflows. [Read More]
The application services vendor patches multiple high-severity vulnerabilities across its flagship product line. [Read More]
Microsoft ships security updates with patches for a whopping 89 documented vulnerabilities, including a browser bug abused in zero-day attacks against some in the white-hat hacker community. [Read More]
An adversary could perform a location correlation attack and access location history, thus de-anonymizing users. [Read More]
South Africa's information regulator has protested WhatsApp's plans to share user data with Facebook, vowing to engage directly with the popular messaging app to ensure its compliance to national privacy laws. [Read More]
Germany security officials are proposing that Internet companies should link a user’s real-world identity to all of their instant messages, emails and other online communication, prompting criticism from digital rights activists. [Read More]

FEATURES, INSIGHTS // Privacy

rss icon

Laurence Pitt's picture
ePrivacy takes GDPR's approach a step further by ensuring personal and family privacy in relation to data collection, storage and usage.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Lance Cottrell's picture
Even while using Tor hidden services, there are still many ways you can be exposed and have your activities compromised if you don’t take the right precautions.
Travis Greene's picture
GDPR is proving disruptive for European citizens who are no longer able to interact with services from outside the EU. And the compliance costs can be significant as well. But are there legitimate concerns of overreach?
Lance Cottrell's picture
Failing to consistently use identity hiding technologies is the most common way to blow your online cover. Just one failure to use your misattribution tools can instantly connect your alias to your real identity.
Preston Hogue's picture
With each new digital industry, process or service comes a new data source that can be compiled and cross referenced, introducing new ways to see into people’s lives, activities and business operations.
Lance Cottrell's picture
Facial recognition systems are becoming cheaper, better, easier to use, and more widely deployed, while social media platforms are creating an ocean of easily identifiable faces that are widely accessible.
Steven Grossman's picture
How can a company protect its information and operations without running askew of data privacy laws and the concerns of its customers?
Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.
Lance Cottrell's picture
By surreptitiously monitoring and engaging with potential attackers and malware developers you can successfully gain information about emerging attack methods, patterns, and practices in the cyber underground.