Privacy

privacy news, analysis, research, how-to, opinion, and video.

Firefox, Mozilla
Facebook gambles $16 billion on WhatsApp

Yahoo

Here's what you should know, and do, about the Yahoo breach

Yahoo's announcement that state-sponsored hackers have stolen the details of at least 500 million accounts shocks both through scale -- it's the largest data breach ever -- and the potential security implications for users.

Facebook gambles $16 billion on WhatsApp

Privacy groups urge US FTC to investigate WhatsApp promises

The U.S. Federal Trade Commission should stop mobile messaging service WhatsApp from sharing user data with parent company Facebook in violation of earlier privacy promises, several privacy and digital rights groups said.

Raj Reddy Heidelberg Laureate Forum Turing

5 tech trends that have Turing Award winners worried

Technology has considerable potential to make the world better, but those benefits are far from guaranteed. Plenty of downsides can pop up along the way, and some of them have Turing Award winners especially worried.

yahoo mail

Yahoo reportedly to confirm massive data breach

Yahoo is reportedly preparing to confirm a data breach that affects hundreds of millions of accounts.

hpe media gallery image 3

Plan now for the EU's privacy regulation revolution, says HPE exec

The cost of complying with the European Union's General Data Protection Regulation might seem like something best deferred until it enters force in 2018 -- but working on compliance could boost profit, not reduce it, say some vendors....

Max Schrems at irish dpc

Facebook privacy class action heads to Europe's top court -- sort of

A class-action-style lawsuit accusing Facebook of targeting advertising based on allegedly illegally processed personal data is heading for the European Union's highest court.

security camera attack surveillance

UK police listened in to 9 percent more calls last year

The U.K. government has published a report on the staggering scale of surveillance in the country last year.

luc portelance theodoros sotiropoulos

Canada-EU counter-terror data exchange is illegal, says top EU judge

An agreement to send Canadian authorities passenger name record (PNR) data for flights from the European Union cannot be entered into in its current form, a top European Union judge has said.

connected home security

Security an afterthought in connected home, wearable devices

In a survey of publicly reported vulnerabilities for consumer connected-home and wearable technology products between November 2015 and July 2016, the nonprofit Online Trust Alliance found that all of potential problems could have...

controlling privacy

Microsoft’s tin ear for privacy

The company keeps defending data-gathering features that some people don’t want instead of just making them optional.

controlling privacy

Carnegie Mellon University helps you control your privacy

Managing your personal data in the digital age has become almost impossible. But Carnegie Mellon University has found that a combination of natural language processing, privacy preference modeling, machine lanuguage, crowdsourcing and...

chromebook

How to control your privacy in Chromebooks vs. Windows 10

Both Chrome OS and Windows 10 help themselves to similar usage data by default, but in different ways.

Generic court image

Google, Apple, Twitter in large group backing Microsoft over ‘gag orders’

Many civil rights groups, trade bodies and companies, including Google, Amazon, Cisco Systems, Apple and Twitter, have filed briefs in a federal court to back Microsoft’s move to prevent the indiscriminate use of gag orders...

Linux Tux

Suspect arrested in 5-year-old kernel.org breach

Five years after a security breach forced the Linux Foundation to take kernel.org offline and to rebuild several of its servers, police have arrested a suspect in the case.

cloud computing data center

U.S. cloud vendors adjust to Snowden effect, Privacy Shield

AWS, Microsoft and Google are building data centers in Europe to address privacy concerns in a post-Snowden world. Cloud infrastructure revenue is rising, but how much better could be for U.S. vendors?

keezel wireless vpn

Keezel's wireless device protects hotel Wi-Fi , home IoT connections

In cryptography, the "man in the middle" is usually an attacker -- but when Keezel wants to get between you and the Wi-Fi connection in your hotel or your home, it's for your own good.

wyndham hotel

FTC v. Wyndham and corporate cybersecurity

Privacy and security are often perceived as weaknesses or risks, but they can be an opportunity. Reputation and brand protection have been identified as two of the biggest drivers behind increased IT spending to address security...

security code big data cyberespionage DDoS

Attackers deploy rogue proxies on computers to hijack HTTPS traffic

A new attack analyzed by malware researchers from Microsoft uses Word documents with malicious code that configures browsers to use a web proxy controlled by attackers.

Load More