International privacy policy: What’s next?
With a new president in the U.S. and U.K. leaving the European Union, the state of privacy agreements is in flux, reports Jeremy Seth Davis.
With a new president in the U.S. and U.K. leaving the European Union, the state of privacy agreements is in flux, reports Jeremy Seth Davis.
Albert Kwon, a Ph.D. student at the Massachusetts Institute of Technology (MIT) has been thinking about ways to develop more robust security methods for anonymous networks since late 2013.
Gone are the days of mega-breaches when a single security incident would dominate customer attention for weeks at a time. Throughout 2016, customers and users were distracted by a seemingly endless stream of organizations hit by devastating breaches. Information security missteps of previous years caught up with many organizations. Technology companies Tumblr, MySpace, LinkedIn, Dropbox,…
U.S. Secretary of Homeland Security Jeh Johnson has embodied the international consensus-building approach favored by the Obama administration. In moving the Department of Homeland Security (DHS) toward a more cohesive cybersecurity strategy, his decisions have not gone without controversy.
A coalition of tech and privacy groups are calling on legislators to delay changes to Rule 41 that would allow judges to issue warrants to remotely access computers located in any jurisdiction.
A security researcher found a new campaign that sends emails masquerading as ISP complaints claiming the email recipients have been detected sending spam.
Security researchers disclosed a series of leaky databases that includes data from State Farm, Sheet Metal Workers Union, Anchor Loans, and the U.S. military.
House Intelligence Chairman Devin Nunes has requested an open-session hearing with Defense Secretary Ashton Carter and Director of National Intelligence James Clapper.
WhatsApp co-founder Jan Koum said the messaging service will add encrypted video calling on Monday, according to a report.
As a growing number of cities provide free WiFi networks become, a security researcher demonstrated his successful hack of his city’s WiFi network.