From Infant Optics to Graco, companies behind several popular radio frequency monitors are either overpromising or underdelivering on security claims, Independent Security Evaluators finds.
Craig Steven Wright, lacking proof, has backed away from his assertion that he’s bitcoin’s inventor. Here’s why any holder of the Internet currency should care who Satoshi really is.
HIPAA doesn’t apply to comments you post on Twitter or groups you join on Facebook. While mining such data can be valuable for preventive health efforts, privacy advocates are concerned.
As people and organizations pay larger sums to free their computers of the malware, The Parallax looks into what’s driving ransomware’s development—and where it’s spreading.
Ask data brokers why your information is important to them, and they’ll tell you that it helps their partners provide you with more personalized services.As... Read More...
The web binding you with data brokers and marketers is complex and confusing. Here's an illustration of how your personal information is collected, packaged, and sold.
Data brokers trade personal information with a wide range of sources for a wide range of purposes. Understanding how they work can help you retain (or regain) control of your data.
From your wireless carrier to your favorite retailer, hundreds of businesses could be following your movements. Here’s how and why—and what they could be doing with your location information.
Although businesses can get insured against losses from online attacks, it’s almost impossible for consumers to do the same. Here’s why—and what you can do instead.
In the 30 years since President Reagan signed the Computer Fraud and Abuse Act into law, it’s been the subject of heated controversy and undergone many alterations. What’s next?
By deploying hundreds of Tor nodes, and mixing machine and human analysis, security company IntelliAgg is tracking and cataloging the Dark Web more accurately than ever.
A San Jose middle-school teacher angry at a newspaper’s characterization of her students’ potential recruits the Silicon Valley tech giant to help them succeed.
A hacker equipped with a $15 dongle and 15 lines of code can exploit the vulnerability to connect to, spy on, and control a computer using it, a Bastille security researcher says.
Apple is defying a court order to circumvent its mobile encryption. The use of a cheap remote-management app—including Apple’s own MDM—could have rendered the issue moot.
Google’s massively popular Android operating system powers billions of phones and tablets around the world, but it’s also far easier for hackers to infiltrate than Apple’s iPhones. Here’s why.
Tech issues may be too complex—and too lacking of simple populist messages—to argue about on stage. But the candidates have their opinions. Here’s an overview.
They’re designed to prevent unauthorized people from firing them, advocates such as the Obama administration say. But are they better (and safer) than safes and trigger locks?
They are questioning whether new privacy regulations specifically governing personal or commercial drone use are necessary and pushing instead to develop best practices.
Why are U.S. government representatives demanding legal access to coded phone calls and text messages? Federal cybersecurity contractor Jan Filsinger says they lack cyber savvy.
With customers worldwide who would be negatively impacted by weakened encryption, Silicon Valley has an obvious interest in uniting together against a very dumb idea.
Tech companies could offer alternatives to end-to-end encryption, but it would make their users less safe, privacy advocates say.
Security researcher Marie Moe has a personal and potentially dangerous connection to the Internet: Following a medical emergency, Moe was outfitted with a pacemaker, in which she has discovered cybersecurity vulnerabilities, she reveals at hacker conference CCC.
Research presented for the first time at the Chaos Communication Congress in Hamburg, Germany, details new insight into the inner workings of China’s Internet censorship firewall.
Internet-connected toys are just as vulnerable to hacks as the rest of the Internet of Things. Experts worry that toymakers aren’t taking their claims seriously.
Proponents say it could greatly benefit marketing, personal productivity, and public-safety endeavors. Privacy watchdogs are concerned that people will misuse it in horrifying ways.
The Data Security and Breach Notification Act and the Data Security Act would pre-empt arguably stronger state laws and strip the FCC of authority over data security enforcement.
Privacy advocates split on how to proceed, after the controversial cybersecurity law gets tacked on to a massive government spending bill.
While Adobe Systems is making changes to better support HTML5, the animation standard isn’t about to replace its security hole-hampered software, as long predicted would happen.
Some lawmakers want social-media providers, ISPs, and other businesses to report suspected terrorist activity, but critics say additional requirements may be counterproductive.
As the technological capabilities of unmanned aerial vehicles proliferate, privacy groups are pushing for laws to require police to obtain warrants to use them.
While several tech titans require warrants to give police and prosecutors access to customers’ older stored communications, countless Internet companies with fewer legal resources likely are complying with agency-issued subpoenas.
The personalized "About me" page, closely resembling Google+, is the search giant’s latest shot at making privacy simple for users to understand and control.
Facebook’s search struggles translate to a backhanded win for privacy.
The federal agency, however, serves as many consumers’ only safeguard against corporate malfeasance, privacy advocates say.
Some security and policy experts see the agreement as a potential model for new treaties—or, at the very least, a sign of progress. Others see a whole lot of problems.
A proposed law to make it easier for government agencies to share information also would allow businesses to deliver personal data to the NSA or FBI, critics contend.
No more articles