The popular messaging app announced on Tuesday that it has already begun encrypting users' messages.
The USA Freedom Act, aimed at NSA surveillance reform, failed to pick up enough votes to avoid a Republican filibuster.
The Internet Security Research Group (ISRG) plans to launch its Let's Encrypt software in 2015 that will let anyone receive a free trusted certificate.
Judges in Pierce County, Wash. approved a new requirement that would make law enforcement officials explicitly cite when they plan to use 'stingray' technology during an investigation.
Facebook unveiled its "Privacy Basics," guidelines that help users control and protect their information.
A federal judge has said Apple must face a lawsuit that claims it didn't reveal that text messages would be blocked when iPhone users switched to Androids.
The Alliance of Automobile Manufacturers and the Association of Global Automakers created "baseline privacy commitments" for the industry.
Two debt sellers allegedly posted the people's personal information on unencrypted, publicly accessible spreadsheets that were post online.
A new Pew Research study on Americans' privacy perceptions after the Edward Snowden leaks shows that most people assume their personal data isn't kept private online.
In a notification letter to customers, Amex said law enforcement has arrested an individual possessing stolen personal and account information.
A Canadian federal bill that would force companies to notify individuals of breaches moved a step closer to being law in October.
Canada's RCMP cannot tell whether it complies with federal privacy law when gathering information about citizens without a warrant, according to a report.
Mozilla is heeding user desire for internet privacy by collaborating with the Tor Project and the Center for Democracy & Technology.
The Associated Press reported that a hack, similar to past intrusions by Chinese hackers, went unnoticed by USIS for months.
The government has begun encrypting user data on two websites providing AIDS-related information.
New European restrictions will require spyware manufacturers to get the EU's permission before exporting their product.
The social media company reported that governments made 34,946 requests for user data, which represented a 24 percent increase since the last half of 2013.
The social media site launched its Tor-friendly version to accommodate users who might want to keep their identities anonymous.
Apple's iPhone 6 and iOS 8 offer encryption for mobile users, but a focus on consumers can create security conundrums, reports Lee Sustar.
The Italian spyware company had its manuals posted online that detail how thoroughly an infected user's actions can be monitored.
The unnamed leaker's house was searched and a criminal case was opened after documents about the U.S. government's terrorist watch list were published.
The Electronic Frontier Foundation (EFF) filed a new brief after the government released its own opposition.
The Federal Communications Commission fined Terracom, Inc. and YourTel America, Inc. $10 million for their failure to protect users' personal information.
The attack used a false certificate to trick iCloud users into handing over personal data and login credentials. With an attack of this size, some experts and researchers believe the Chinese government could be to blame.
The groups shared comments on V2V communications with the National Highway Traffic Safety Administration.
Kristin Nyunt of Monterey, Calif., is charged with two counts of illegal wiretapping and possession of illegal interception devices and faces a sentence of up to five years in prison.
Security Key plugs into a user's USB port and can now be used as a primary method for account login verification.
The Florida Supreme Court put the kibosh on warrantless real-time tracking using location data obtained from cell phone providers.
Information on half a million federal workers in the government's SmartBuy program went undetected by Chase hackers.
President Obama signed an Executive Order at the Consumer Financial Protection Bureau calling for enhanced security measures, including microchips and PINs.
Sign up to our newsletters
SC Magazine Articles
- Operators disable firewall features to increase network performance, survey finds
- Fake Dropbox login page nabs credentials, is hosted on Dropbox
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Citadel variant targets master passwords, authentication solutions
- USPS draws ire of Congress over data breach response
- Buffer overflow vulnerabilities identified in Hikvision DVR devices
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- Vulnerabilities identified in three Advantech products