![unmask mask digital persona](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105704/unmask-400x200.jpg)
Uncloaking Tor Browser users with DRM-protected files
Digital Rights Management (DRM)-protected media files can be used to reveal Tor Browser users’ actual IP address and therefore possibly reveal their identity, …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105157/hand-400x200.jpeg)
Egyptian civil society NGOs targeted with sophisticated phishing
In the last few months, a number of Egyptian civil society organizations, lawyers, journalists, and independent activists have been targeted with personalized and generic …
![Privacy Shield](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114002/privacy-shield-item-400x200.jpg)
Privacy expectations and the unfortunate reality
A recent survey that polled 5,710 Americans on private browsing (aka “Privacy Mode”, aka “Incognito Mode”) revealed that 46 percent of them have used …
![Android unlocked](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111119/android-unlock-400x200.jpg)
Can you trust your Android VPN client?
Do you trust your Android VPN client to keep your data secure and your online browsing private? Perhaps you shouldn’t. A group of researchers has analyzed 283 Android …
![consumer](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105245/consumer-400x200.jpg)
Consumers worried about privacy more than ever
84% of U.S. consumers expressed concern regarding the security of their personally identifiable information (PII) and 70% told IDC that their concern is greater today than …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113423/world-400x200.jpg)
Family dynamics in a connected world
A new global study by Intel Security aims to better comprehend how families’ attitudes and habits are evolving as their homes and lifestyles become increasingly connected. …
![eye dark](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105300/eye-dark-400x200.jpg)
How money-hungry data brokers erode privacy in China
A recent expose by Southern Metropolis Daily, a Chinese daily newspaper known for its investigative reporting, has revealed that random people with enough money at their …
![USA](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105306/usa-400x200.jpg)
54% of Americans say existing cyber security laws aren’t getting the job done
As President Trump and the new Congress stake out a 2017 agenda, Americans want to see a pressing need to modernize laws dealing with the digital economy and stepped up …
![](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105308/lavabit-400x200.jpg)
Encrypted webmail service Lavabit relaunched
Lavabit, the secure encrypted webmail service used by Edward Snowden, is back online. Lavabit founder and operator Ladar Levison shut it down in 2013 when the US government …
![Lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113522/lock-eye-400x200.png)
Global data privacy laws: The #1 cross-border e-discovery challenge
In the year since the EU’s rejection of Safe Harbor, there has been a spike in legal concern over cross-border data transfers, according to a survey by BDO Consulting. Sixty …
![Meitu](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105318/meitu-400x200.jpg)
Meitu photo retouching app may be invading your privacy
Have you heard about Meitu, the photo retouching mobile app that turns people into more cutesy or beautiful versions of themselves? Chances are that even if you don’t …
![fingerprint](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113609/fingerprint-400x200.jpg)
Accurate cross-browser fingerprinting is possible, researchers show
A group of researchers have come up with a browser fingerprinting technique that can allow interested parties to “identify” users across different browsers (on the …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege