How to remove personal data from connected cars
“Your car is a computer that stores a lot of information about you. When you sell or donate your car, that personal data might be accessible to the next owner if you …
Privacy Shield: Should I stay or should I go?
The lead up to the GDPR enforcement date consumed a large swath of media coverage. This essentially buried the news that in early July 2018, the European Union Parliament …
Companies reliant on consumer data are at risk
Companies with business models reliant on the increasing quantity and scope of consumer data are at risk if public ambivalence about data privacy turns to opposition, …
Turning off Location History doesn’t prevent Google from knowing your location
If you believe that by turning off Location History on your Android device or iPhone means that Google won’t be able to know your location, think again: Princeton …
Android Pie: Security and privacy changes
It is official: “Android P” is Android Pie, and it comes with a variety of new capabilities and security and privacy changes. The newest version (9.0) of the …
Cybercrime gangs continue to go where the money is
According to the APWG’s new Phishing Activity Trends Report, phishing in the first part of 2018 surged 46 percent higher than late 2017. The total number of phish detected in …
Achieving compliance: GDPR, CCPA and beyond
AB 375, or the California Consumer Privacy Act (CCPA) of 2018, was signed into law by California Governor, Jerry Brown, on June 28, 2018 and is recognized as one of the …
How rogue data puts organisations at risk of GDPR noncompliance
The GDPR compliance deadline came in by force on 25th May 2018 and applies to all organisations processing and holding the personal information of data subjects. This includes …
Privacy pros gaining control of technology decision-making over IT
TrustArc and IAPP announced the results of new research that examined how privacy technology is bought and deployed to address privacy and data protection challenges. …
World powers equip, train other countries for surveillance
Privacy International has released a report that looks at how powerful governments are financing, training and equipping countries with surveillance capabilities. Countries …
Zero login: Fixing the flaws in authentication
Passwords, birth certificates, national insurance numbers and passports – as well as the various other means of authentication, that we have relied upon for the past century …
Only 20% of companies have fully completed their GDPR implementations
Key findings from a survey conducted by Dimensional Research highlight that only 20% of companies surveyed believe they are GDPR compliant, while 53% are in the implementation …
Featured news
Resources
Don't miss
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd
- Ivanti Connect Secure zero-day exploited by attackers (CVE-2025-0282)
- The U.S. Cyber Trust Mark set to launch
- Mitel MiCollab, Oracle WebLogic Server vulnerabilities exploited by attackers
- Why an “all gas, no brakes” approach for AI use won’t work