I may have mentioned it once or twice before, but I used to work in a data protection regulator, so – as you can imagine – I have some fairly strong views about the importance and role of regulation in protecting and vindicating the data protection and…
I may have mentioned it once or twice before, but I used to work in a data protection regulator, so – as you can imagine – I have some fairly strong views about the importance and role of regulation in protecting and vindicating the data protection and…
For decades, the cornerstone of IT security has been Public Key Infrastructure, or PKI, a system that allows you to encrypt and sign data, issuing digital certificates that authenticate the identity of users.
I would like to take a step back to take in a broader, bigger picture than usual in this article, moving across time as well as into the legal sphere. Technology isn’t just hardware and software; it’s a fundamental component of every aspect of our live…
Avast researchers have found that Android flashlight applications request an average of 25 permissions to access data or features on mobile devices, potentially exposing users in unnecessary ways.
A security researcher discovered an exposed server that contained several databases of information on over 419 million Facebook accounts, Tech Crunch reported. Predominantly listing users’ phone numbers and Facebook IDs, the server also exposed other b…
Facebook controversies come and go, but a recent issue involving the surveillance and transcription of users’ conversations seems particularly troubling to government officials, privacy watchdogs, and users. Here are answers to 10 questions you may hav…
Cybersecurity researchers discovered an unprotected and unencrypted database containing over 161 million records belonging to movie ticket subscription service MoviePass. TechCrunch reported that many of the records pertained to daily service operation…
Many consumers are aware of cookies that track web activity, and their use is fairly well-regulated. But online fingerprinting (also called device fingerprinting) is not as well understood. We believe mainstream media is vastly underestimating how prev…
I’ve often written here about how companies exploit our tendency to accept lax security defaults. People don’t have time to read thousands of pages of terms of service or bother to ask why a mobile game needs to know their ID and location. (It’s usuall…