Facebook needs to do more to stem the spread of disinformation on its platforms, employees said in an internal letter, including vetting and labeling political ads. Experts agree.
There isn’t yet a one-size-fits-all way to prepare for or respond to social-media search demands—or device searches—at the border. But there are guidelines.
As a chorus of voices pursuing antitrust action against Big Tech grows louder, it’s important to note that even using regulations to protect consumer privacy is far from a simple endeavor.
App functionality or commercial demands sometimes require access to calendars, cameras, or contacts. Here, a basic, if crassly capitalistic, explanation is appropriate.
Facebook might not sell user data. But it has been trading deep access to it with tech powerhouses Amazon, Netflix, Huawai, and others, according to a New York Times report.
You might think of cybersecurity professionals as tech’s collective “watchers on the wall”—the guardians who let you know when doom is coming. With that perspec... Read More...
The massive data breach Facebook reported at the end of September isn’t quite as big as the company thought it might be. That might sound good, but it isn’t lik... Read More...
Like last week’s Kavanaugh hearings, Facebook’s acknowledgment of a cyberattack that led to a mass account reset alarmed officials and left key questions unanswered.
The 12th version of Apple’s browser will expand its Intelligent Tracking Prevention to shield users from tracking related to social networks’ commenting systems. Here’s why.
Fighting the spread of fake news bears similarities to fighting spam. Using tech and human insights, Facebook is essentially filtering it via flagging, fact checking, and feed demotion.
The WebAuthn authentication protocol, backed by Google, Microsoft, PayPal, and others (but notably not Apple), uses physical second factors like phones, and supports biometrics.
Worried about what the social network’s advertisers might be able to see? Take a hard look at the Facebook data you've shared (perhaps inadvertently). You might be unpleasantly surprised.
Is the latest data-handling revelation driving you away from Facebook? Here’s how to remove yourself from the social network while keeping your valuable data (and friendships).
Effectively social engineering at scale—simultaneously targeting millions of people across diverse ecosystems—isn’t necessarily a plausible concept. Not without AI and chatbots, that is.
Using a bug bounty payment to conceal extortion or a breach, as Uber did, violated platform policies and Justice Department guidelines. Security experts explain how it also put consumers at risk.
During their 75-minute Enigma Interviews talk, moderated by The Parallax, Alex Stamos of Facebook and Eva Galperin of EFF debated how online services should protect groups with varying vulnerabilities.
The first Enigma Interviews event will focus on the challenges Facebook and others face in protecting average users alongside high-profile hacking targets.
The social-networking giant’s chief security officer sounds off on why and how political campaigns should work together to fight attacks on their critical infrastructure and information.
Delegated Recovery, debuted alongside GitHub, unlocks linked accounts without texted log-in codes, secret questions, or emailed links. Its special sauce? Tokens sent over an encrypted connection.
We asked security experts how to better control the personal data that mobile apps, including those of Facebook and Google, expose about us. Here’s their advice.
End-to-end encryption can’t mask message metadata, which WhatsApp is now sharing with other Facebook companies. Here’s why—and how security experts advise responding.
It’s a quixotic journey at best, PR guru Jonathan Hirshon says. Nevertheless, it’s one he’s successfully navigated for years to “educate people” about privacy, if nothing else. Here’s how.
The social network says it isn’t listening to users’ conversations to better target ads. For good measure, here are several ways to limit app access to your voice and online interactions.
Automated bug detectors often add another layer of security to app development. The social network’s software blocks its programmers from reusing code containing a known vulnerability.
As the social network’s settings and policies evolve, users need to stay on top of what they are sharing with Facebook and others. Take these steps, and you’ll feel more secure.
A San Jose middle-school teacher angry at a newspaper’s characterization of her students’ potential recruits the Silicon Valley tech giant to help them succeed.
Malicious spam takes form in a variety of ways on the social network. Here are common tactics that cybercriminals use to entice you to click and reveal your personal info.
When your account gets hacked, you may feel as if your best online connection to friends has been shattered. Here’s how you get back to normal—and prevent another attack.