Security Experts:

long dotted


Trend Micro has confirmed that some of its applications for macOS systems collect browser history and send it to the security firm’s servers. [Read More]
Google is taking its legal fight against an order requiring it to extend "right to be forgotten" rules to its search engines globally to Europe's top court. [Read More]
It took Equifax 76 days to detect the massive data breach in 2017, despite the attackers running 9,000 unauthorized queries on its databases, according to a GAO report [Read More]
AnchorFree, the company that makes the Hotspot Shield VPN, raised $295 million in a new funding round, bringing the total raised to date to nearly $358 million [Read More]
Uber chief Dara Khosrowshahi said the smartphone-summoned ride service is reinforcing safeguards for passengers and their personal information. [Read More]
Mozilla appoints Alan Davidson as new Vice President of Global Policy, Trust and Security. Davidson previously worked at the US Department of Commerce, New America and Google [Read More]
Privacy concerns have been raised after a coalition of intelligence agencies renewed a call for technology companies to allow backdoor access to encrypted content and devices. [Read More]
Facebook has pulled the Onavo Protect security app, one of its own products, from Apple's app store because it didn't want to stop tracking what people were doing on their iPhones. [Read More]
Facial recognition technology was credited with the arrest of a man attempting to use a fake passport to enter the United States at Washington's Dulles airport, officials said. [Read More]
Wickr partners with Psiphon to create Wickr Open Access, which combines Wickr's cryptography with Psiphon's network availability to provide consistent deliverable security, anywhere [Read More]


rss icon

Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Lance Cottrell's picture
Even while using Tor hidden services, there are still many ways you can be exposed and have your activities compromised if you don’t take the right precautions.
Travis Greene's picture
GDPR is proving disruptive for European citizens who are no longer able to interact with services from outside the EU. And the compliance costs can be significant as well. But are there legitimate concerns of overreach?
Lance Cottrell's picture
Failing to consistently use identity hiding technologies is the most common way to blow your online cover. Just one failure to use your misattribution tools can instantly connect your alias to your real identity.
Preston Hogue's picture
With each new digital industry, process or service comes a new data source that can be compiled and cross referenced, introducing new ways to see into people’s lives, activities and business operations.
Lance Cottrell's picture
Facial recognition systems are becoming cheaper, better, easier to use, and more widely deployed, while social media platforms are creating an ocean of easily identifiable faces that are widely accessible.
Steven Grossman's picture
How can a company protect its information and operations without running askew of data privacy laws and the concerns of its customers?
Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.
Lance Cottrell's picture
By surreptitiously monitoring and engaging with potential attackers and malware developers you can successfully gain information about emerging attack methods, patterns, and practices in the cyber underground.
Jim Ivers's picture
With the advent of connected devices, privacy and security have become tightly linked because theft of private data is often the goal of malicious attacks.