Australian motorcycle helmet maker Forcite is trying to balance utility, safety, and privacy. Here’s a look at today’s challenges in securing connected devices, from Washington to Sydney.
As a chorus of voices pursuing antitrust action against Big Tech grows louder, it’s important to note that even using regulations to protect consumer privacy is far from a simple endeavor.
Tech firms would like one privacy law to cover all U.S. communications—as long as it’s not as strict as the GDPR and also supersedes any pesky state regulations like the CCPA.
Without regulatory pressure to enforce a federal health care cybersecurity task force’s recommendations, involved experts acknowledge, industry progress will remain slow.
European regulators fined Google for abusing power and demanded that it relaxes restrictions on Android vendors. What could a privacy-focused phone maker do with this new latitude?
The state of Internet of Things security stinks, experts say. And while device manufacturers and lawmakers aren’t anxious to address it, there are clear signs of influence from other actors. IoT regulation is likely on its way.
The new EU law, which comes with stiff penalties, is set to enforce consumer privacy standards exceeding those of the United States in several key ways.
Using a bug bounty payment to conceal extortion or a breach, as Uber did, violated platform policies and Justice Department guidelines. Security experts explain how it also put consumers at risk.
The vast majority of anti-Net neutrality public comments made to the FCC were sent from stolen email addresses, according to study results. And the implications are serious.
Dismantling FCC Open Internet rules might allow ISPs to mess with privacy and security. But doing so today simply wouldn’t be practical or even profitable, Rob Graham argues.
At the second Enigma Interviews, we discussed how easy car software is to manipulate—what carmakers are really chasing, as they promote their connectedness.
Privacy advocates in Congress oppose reauthorization of FISA’s Section 702 without major reform. The implication: Existing surveillance programs won’t survive without new privacy protections.
As regulation of Internet-connected devices inches forward, public officials and security experts disagree on how best to keep consumers safe without stifling industry innovation.
From a plea for an “NIH for cyber” to a plan for “software supply chain transparency,” Black Hat and DefCon insiders say it’s time for the U.S. government to ensure software safety.
Beware of the robocalls. With fraudulent calls (and consumer complaints about them) on the rise, the Federal Trade Commission is calling on tech companies to help block them.
Proponents say it could greatly benefit marketing, personal productivity, and public-safety endeavors. Privacy watchdogs are concerned that people will misuse it in horrifying ways.
While several tech titans require warrants to give police and prosecutors access to customers’ older stored communications, countless Internet companies with fewer legal resources likely are complying with agency-issued subpoenas.