Please turn on your JavaScript for this page to function normally.
tracking
CNAME-based tracking increasingly used to bypass browsers’ anti-tracking defenses

As browser-makers move to defang third-party (tracking) cookies, marketers are increasingly switching to alternative tracking techniques. One of these is CNAME cloaking, which …

mobile apps
Researchers propose more secure and private mobile contact tracing

For public health officials, contact tracing remains critical to managing the spread of the coronavirus — particularly as it appears that variants of the virus could be …

lock
Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations

After earning his master’s degree in computer science and working on the IT side of the business at a number of large financial services organizations, Bobby Balachandran …

Apple
Apple details major security, privacy enhancements in its devices

Security and privacy are a big selling point for Apple. The company has released on Thursday a newer version of its Platform Security Guide, outlining the security and privacy …

numbers
Homomorphic encryption: Myths and misconceptions

One of the challenges with the current pace of innovation is deciphering what is real and what is vaporware. Most of us are understandably skeptical when we hear of technical …

user
How can we protect ourselves against fake news and manipulation?

The internet has revolutionized our lives – whether in terms of working, finding information or entertainment, connecting with others, or shopping. The online world has …

face
Consumers not protecting data online despite having privacy concerns

Startpage announced results of its survey exploring the attitudes of Americans towards protecting their own privacy online. The results found a gap between the high levels of …

password
Rampant password reuse puts companies and customers at risk

25.9 million business account credentials and over 543 million breach assets tied to employees in the Fortune 1000 are readily available on the criminal underground, SpyCloud …

Biohazard
mHealth apps consistently expose PII and PHI through APIs

All of the 30 popular mHealth apps that were tested are vulnerable to API attacks that can allow unauthorized access to full patient records including protected health …

privacy
Big Tech will try to pre-empt harsh privacy laws by writing their own

Over the past decade, the firms that make up the so-called Big Tech have captured enough of the global economy to resemble industrial cartels from a bygone era. Amazon, Apple, …

risk
People are often the collateral damage of attacks on corporations

Thanks to cyberattacks making regular headlines in the news, it’s no secret that massive data breaches are a significant threat to organizations. However, a report from …

Cybersecurity risk management
Organizations can no longer afford a reactive approach to risk management

Board members and C-suite executives around the globe are most concerned in 2021 with risks associated with COVID-19-related government policies and regulations, economic …

Don't miss

Cybersecurity news