Please turn on your JavaScript for this page to function normally.
Ars Technica readers urged to change passwords in wake of hack

In case you haven’t heard already, Ars Technica got hacked over the weekend, so if you are a subscribed reader now would be a good time to change your password. …

Tackling the growing web of data residency and privacy regulations

With an increasing number of companies moving to the cloud, we’ve seen a surge in investment by cloud providers to build international datacenters. While these …

Companies invested millions in privacy in 2014

As the number of data breaches in the U.S. reached 708 in 2014, new research shows that companies are investing millions in privacy and multiple business units are now …

10 strategies to protect patient information

Data breaches, lawsuits, medical identity theft—all cringe-worthy realities—and the threats to patient data have never been greater. With cybercrime targeting healthcare, …

Negotiating privacy in the age of Big Data

The promise of the Big Data revolution is all around us – improving our quality of life and providing us with new insights in culture, science, economics, and …

Internet freedom around the world is in decline

US-based NGO Freedom House has published its fifth annual Freedom of the Net study and the results are upsetting: internet users in nearly half of the 65 countries assessed in …

Bebe Stores latest victim of a payment card breach

Another big US-based has suffered a card data breach. According to information initially gathered by Brian Krebs and several banks, Bebe Stores – a women’s retail …

Protecting your child’s digital identity

Each day, as infosec professionals, we dedicate ourselves to protecting our client’s most valuable assets. We spend countless hours focused on keeping data, intellectual …

How to detect fraudulent activity in a cloud without invading users’ privacy

A group of researchers have found a clever way for cloud providers to detect fraudulent activities in their clouds without actually probing into the kind of activity a user …

Regin backdoor: Sophisticated, stealthy, state-sponsored?

Symantec researchers are warning about a new, complex cyber espionage tool that has been around for years and that has likely been created and is wielded by a nation state. …

Open Whisper Systems helps WhatsApp achieve end-to-end encryption

The immensely popular Whatsapp instant messenger has the potential to become an even more attractive option for users, as the company has partnered with Open Whisper Systems …

TRUSTe deceived consumers through its privacy seal program

TRUSTe has agreed to settle Federal Trade Commission charges that it deceived consumers about its recertification program for company’s privacy practices, as well as …

Don't miss

Cybersecurity news