Privacy

Ring Will No Longer Allow Police to Request Doorbell Camera Footage From Users

Ring Will No Longer Allow Police to Request Doorbell Camera Footage From Users 2024-01-25 at 14:02 By Associated Press Amazon-owned Ring will stop allowing police to request doorbell camera footage from users following criticism from privacy advocates. The post Ring Will No Longer Allow Police to Request Doorbell Camera Footage From Users appeared first on […]

React to this headline:

Loading spinner

Ring Will No Longer Allow Police to Request Doorbell Camera Footage From Users Read More »

France Fines Yahoo 10 Mn Euros Over Cookie Abuses

France Fines Yahoo 10 Mn Euros Over Cookie Abuses 2024-01-22 at 13:16 By AFP France’s data protection watchdog fines Yahoo 10 million euros for not respecting users’ refusals of internet-tracking “cookies” The post France Fines Yahoo 10 Mn Euros Over Cookie Abuses appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

France Fines Yahoo 10 Mn Euros Over Cookie Abuses Read More »

Attribute-based encryption could spell the end of data compromise

Attribute-based encryption could spell the end of data compromise 2024-01-18 at 08:02 By Help Net Security The future of data privacy is the end of compromise. With the world producing data at astounding rates, we need ways to put data to the best use while protecting against breaches and ensuring privacy, data protection and access

React to this headline:

Loading spinner

Attribute-based encryption could spell the end of data compromise Read More »

CISOs’ crucial role in aligning security goals with enterprise expectations

CISOs’ crucial role in aligning security goals with enterprise expectations 2024-01-17 at 07:01 By Mirko Zorz In this Help Net Security interview, Chris Mixter, Vice President, Analyst at Gartner, discusses the dynamic world of CISOs and how their roles have evolved significantly over the years. He outlines the critical skills for CISOs in 2024, addresses

React to this headline:

Loading spinner

CISOs’ crucial role in aligning security goals with enterprise expectations Read More »

Ho, Ho, Hoooold on a Minute: A New Year Resolution That IoT Isn’t a Gift That Keeps on Taking

Ho, Ho, Hoooold on a Minute: A New Year Resolution That IoT Isn’t a Gift That Keeps on Taking 2024-01-16 at 18:16 By Tom Eston Some IoT products may make your life easier, but they also may be somewhat of a Trojan Horse.  The post Ho, Ho, Hoooold on a Minute: A New Year Resolution

React to this headline:

Loading spinner

Ho, Ho, Hoooold on a Minute: A New Year Resolution That IoT Isn’t a Gift That Keeps on Taking Read More »

API security in 2024: Predictions and trends

API security in 2024: Predictions and trends 2023-12-29 at 07:02 By Help Net Security As technology continues to advance at an unprecedented pace, so does the complexity of API (application programming interface) security. With the proliferation of APIs in modern applications and services, organizations will need to develop a better understanding of their API environments

React to this headline:

Loading spinner

API security in 2024: Predictions and trends Read More »

FTC Proposes Strengthening Children’s Online Privacy Rules to Address Tracking, Push Notifications

FTC Proposes Strengthening Children’s Online Privacy Rules to Address Tracking, Push Notifications 21/12/2023 at 15:32 By Associated Press The FTC has proposed strengthening children’s online privacy rules to address tracking and push notifications. The post FTC Proposes Strengthening Children’s Online Privacy Rules to Address Tracking, Push Notifications appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

FTC Proposes Strengthening Children’s Online Privacy Rules to Address Tracking, Push Notifications Read More »

Preserving privacy through advanced encryption techniques

Preserving privacy through advanced encryption techniques 18/12/2023 at 07:01 By Help Net Security At its core, encryption involves the use of algorithms, mathematical functions that manipulate data into a seemingly random and indecipherable form. This encoded information, referred to as ciphertext, can only be converted back into its original, meaningful state by those possessing the

React to this headline:

Loading spinner

Preserving privacy through advanced encryption techniques Read More »

Shifting data protection regulations show why businesses must put privacy at their core

Shifting data protection regulations show why businesses must put privacy at their core 13/12/2023 at 08:31 By Help Net Security Like it or not, data protection will be one of the biggest issues organizations face in 2024. Knowing where to focus compliance efforts will be tricky, with more and more state-level privacy laws becoming effective

React to this headline:

Loading spinner

Shifting data protection regulations show why businesses must put privacy at their core Read More »

eIDAS: EU’s internet reforms will undermine a decade of advances in online security

eIDAS: EU’s internet reforms will undermine a decade of advances in online security 12/12/2023 at 08:32 By Help Net Security The European Union’s attempt to reform its electronic identification and trust services – a package of laws better known as eIDAS 2.0 – contains legislation that poses a grave threat to online privacy and security.

React to this headline:

Loading spinner

eIDAS: EU’s internet reforms will undermine a decade of advances in online security Read More »

Mine Lands $30M Series B for Data Privacy Tech

Mine Lands $30M Series B for Data Privacy Tech 05/12/2023 at 17:32 By Ryan Naraine Israeli early-stage startup snags financing from Battery Ventures, PayPal Ventures and Nationwide Ventures. The post Mine Lands $30M Series B for Data Privacy Tech appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source

React to this headline:

Loading spinner

Mine Lands $30M Series B for Data Privacy Tech Read More »

RDRS: ICANN’s new service for easier access to nonpublic domain data

RDRS: ICANN’s new service for easier access to nonpublic domain data 04/12/2023 at 17:31 By Help Net Security The Internet Corporation for Assigned Names and Numbers (ICANN) has launched the Registration Data Request Service (RDRS). The RDRS is a new service that introduces a more consistent and standardized format to handle requests for access to

React to this headline:

Loading spinner

RDRS: ICANN’s new service for easier access to nonpublic domain data Read More »

Tails 5.2.0 comes with several improvements, updated Tor Browser

Tails 5.2.0 comes with several improvements, updated Tor Browser 29/11/2023 at 13:33 By Help Net Security Tails is a portable operating system that protects against surveillance and censorship. Tails can be installed on any USB stick with a minimum of 8 GB. Tails works on most computers under ten years old. You can start again

React to this headline:

Loading spinner

Tails 5.2.0 comes with several improvements, updated Tor Browser Read More »

Security leaders on high alert as GenAI poses privacy and security risks

Security leaders on high alert as GenAI poses privacy and security risks 27/11/2023 at 08:32 By Help Net Security Companies need help to get visibility into the operations of their AI programs, potentially reducing productivity while creating significant risks around governance, data security, and more. In this Help Net Security video, Neil Cohen, Head of

React to this headline:

Loading spinner

Security leaders on high alert as GenAI poses privacy and security risks Read More »

Vulnerability disclosure: Legal risks and ethical considerations for researchers

Vulnerability disclosure: Legal risks and ethical considerations for researchers 27/11/2023 at 07:32 By Mirko Zorz In this Help Net Security interview, Eddie Zhang, Principal Consultant at Project Black, explores the complex and often controversial world of vulnerability disclosure in cybersecurity. Zhang explores the intricate balancing act that researchers must perform when navigating the interests of

React to this headline:

Loading spinner

Vulnerability disclosure: Legal risks and ethical considerations for researchers Read More »

1 in 5 executives question their own data protection programs

1 in 5 executives question their own data protection programs 24/11/2023 at 08:01 By Help Net Security In this Help Net Security video, Tanneasha Gordon, Deloitte Risk & Financial Advisory’s data & privacy leader, discusses how many executives realize that trust is crucial to driving brand value and earning sustained customer loyalty. Privacy programs, data

React to this headline:

Loading spinner

1 in 5 executives question their own data protection programs Read More »

Italian regulators investigate online AI data scraping

Italian regulators investigate online AI data scraping 23/11/2023 at 12:02 By Cointelegraph By Savannah Fortis The Italian Data Protection Authority has launched a “fact-finding” probe into the security practices of public and private websites to prevent AI data scraping. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

Italian regulators investigate online AI data scraping Read More »

Online stores may not be as secure as you think

Online stores may not be as secure as you think 23/11/2023 at 07:01 By Help Net Security Credit card skimming is on the rise for the holiday shopping season, according to Malwarebytes. Online stores are not always as secure as you might think they are, and yet you need to hand over your valuable credit

React to this headline:

Loading spinner

Online stores may not be as secure as you think Read More »

Can blockchain supply the guardrails to keep AI on course?

Can blockchain supply the guardrails to keep AI on course? 21/11/2023 at 18:02 By Cointelegraph By Andrew Singer Some believe that hybrid blockchains with both private and public aspects can solve AI’s black-box problem. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

Can blockchain supply the guardrails to keep AI on course? Read More »

Tor Network Removes Risky Relays Associated With Cryptocurrency Scheme

Tor Network Removes Risky Relays Associated With Cryptocurrency Scheme 21/11/2023 at 16:46 By Eduard Kovacs The Tor network has removed many relays associated with a cryptocurrency scheme, citing risk to integrity and users.  The post Tor Network Removes Risky Relays Associated With Cryptocurrency Scheme appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Tor Network Removes Risky Relays Associated With Cryptocurrency Scheme Read More »

Scroll to Top