Please turn on your JavaScript for this page to function normally.
VPN
Almost all VPNs are vulnerable to traffic-leaking TunnelCrack attacks

Several vulnerabilities that affect most VPN products out there can be exploited by attackers to read user traffic, steal user information, or even attack user devices, …

artificial intelligence
Navigating generative AI risks and regulatory challenges

The mass availability of generative AI, such as OpenAI’s ChatGPT and Google Bard, became a top concern for enterprise risk executives in the second quarter of 2023, according …

Google
Google makes removal of personal user info from Search easier

Google is making it easier for users to remove personal contact information and personal, non-consensual explicit imagery from Google search results. “Of course, …

Isabela Fernandes
Delivering privacy in a world of pervasive digital surveillance: Tor Project’s Executive Director speaks out

The overarching mission of the US-based non-profit organization the Tor Project is to advance human rights and make open-source, privacy preserving software available to …

Jean-Charles Chemin
Data privacy vault: Securing sensitive data while navigating regulatory demands

In this Help Net Security interview, Jean-Charles Chemin, CEO of Legapass, provides insight into the correlation between maintaining customer trust and protecting sensitive …

U.S. Cyber Trust Mark
U.S. Cyber Trust Mark labeling program raises the bar for smart devices’ cybersecurity

The Biden-Harris Administration has announced a cybersecurity certification and labeling program to help Americans more easily choose smart devices that are safer and less …

EU-U.S. Data Privacy Framework
European Commission adopts adequacy decision for safe EU-U.S. data flows

Today, the European Commission adopted its adequacy decision for the EU-U.S. Data Privacy Framework. The decision concludes that the United States ensures an adequate level of …

passwordless
Overcoming user resistance to passwordless authentication

Many organizations agree in theory that passwordless authentication is the future, but getting there represents a significant change management challenge. The migration to …

Mike Fey
Island Enterprise Browser: Intelligent security built into the browsing session

In this Help Net Security interview, Mike Fey, CEO of Island, explains the differences between consumer browsers and the Island Enterprise Browser, how it protects …

Patricia Thaine
ChatGPT and data protection laws: Compliance challenges for businesses

In this Help Net Security interview, Patricia Thaine, CEO at Private AI, reviews the main privacy concerns when using ChatGPT in a business context, as well as the risks that …

identity theft
Examining the long-term effects of data privacy violations

Regulatory bodies are taking potential data privacy violations much more seriously this year after a relatively quiet period that followed the enactment of regulations such as …

Zoom
Zoom announces privacy enhancements and tools

Zoom has introduced a new range of privacy enhancements and tools to make sure users have control over their data and their privacy preferences. These enhancements not only …

Don't miss

Cybersecurity news