![Firefox](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094102/firefox-400x200.jpg)
Firefox now blocks third-party tracking cookies, cryptomining scripts by default
It took a lot of testing and tweaking, but Mozilla’s Firefox browser is finally being delivered with Enhanced Tracking Protection and a web-based cryptomining blocking …
![jackal](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100237/jackal-400x200.jpg)
Cardholders still dropping the ball when it comes to basic ID theft prevention
Four in 10 people with a credit or debit card have provided their full Social Security number in an online form in the past month, according to a new report from CompareCards, …
![blocks](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095834/blocks-400x200.jpg)
Unlocking the future of blockchain innovation with privacy-preserving technologies
The origins of blockchain as many are familiar with it today can be traced back to the Bitcoin whitepaper, first published in 2008 by Satoshi Nakamoto, which offered a vision …
![](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103910/facebook-icon-400x200.jpg)
New tool enables users to disconnect their off-Facebook activity from their account
Facebook has announced the (partial) roll-out of a long-awaited “Clear History” privacy tool for users, only it ended up being dubbed “Off-Facebook …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102610/gdpr-3-400x200.jpg)
When will the GDPR pot boil over? It’s sooner (and different) than you think
There’s an old saying that a watched pot never boils. In reality, the sauce in that pot is heating up in a way we can’t quite see yet. After the major compliance ramp by …
![insider](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101239/insider-400x200.jpeg)
With shadow IT running rampant, how can IT keep pace?
Data privacy is high on the minds of businesses and consumers alike, as society at large is getting wise to the potential dangers that even seemingly innocuous apps (ie. …
![CCPA](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093607/CCPA-400x200.jpg)
Automating CCPA compliance: Organize your data and manage requests
Time is running out for California-based businesses to prepare for the California Consumer Privacy Act (CCPA), which goes into effect on January 1, 2020. Despite the Act being …
![smartphone isolation](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101952/smartphone-isolation-400x200.jpg)
Researchers were able to detect what is typed using just a smartphone
You likely know to avoid suspicious emails to keep hackers from gleaning personal information from your computer. But a new study from SMU (Southern Methodist University) …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112023/face-400x200.jpg)
Huge database found leaking biometric, personal info of millions
While working on a web-mapping project, vpnMentor researchers Noam Rotem and Ran Locar discovered a publicly accessible database containing fingerprint records of over 1 …
![Privacy Shield](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114002/privacy-shield-item-400x200.jpg)
There is widespread business confusion and ignorance about the upcoming CCPA regulation
ESET polled 625 business owners and company executives to gauge business readiness for the upcoming California Consumer Privacy Act (CCPA), which goes into effect on January …
![Phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093732/phishing2-400x200.jpg)
Assessing the efficiency of phishing filters employed by email service providers
Technology companies could be doing much more to protect individuals and organizations from the threats posed by phishing, according to research by the University of Plymouth. …
![Black Hat](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113350/black_hat2-400x200.jpg)
Security trends to follow at Black Hat USA 2019
Black Hat USA 2019 is just around the corner! Selecting which sessions to attend from among the conference’s jam-packed catalog of training sessions, panels and briefings can …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege