European privacy watchdogs say Google and other search engines must comply with "right to be forgotten" link-removal requests not just on their European sites, but across all of their sites, raising fears of EU censorship run amok.
A year after Facebook received a bug report regarding a loophole in its app architecture, the vulnerability remains exploitable, says the researcher who discovered this potential threat to user privacy.
A new U.K. government report accuses social networks of serving as a "safe haven for terrorists," inflaming what some see as tense relations in the post-Snowden era between the British government and Silicon Valley.
Until we get to a stage where we can guarantee the confidentiality of traditional identity reference data such as names, addresses, emails and favorite cat colors, we must move away from relying on this static data for authentication. Truly massive amounts of this information are stolen on a regular basis, proving we...
How relevant is ROI when demonstrating security to senior management? How seriously do Indian organizations take the practice of privacy? Sagar Karan, CISO at Fullerton India, shares his insights on these topics.
Most citizens rightly don't trust the Internet as a voting booth. But the Atlantic Council's Jason Healey says that could change, not because of better security, but because the digital generation might demand it as they age.
Apple CEO Tim Cook traveled to China in the wake of allegations that hackers are targeting Chinese iCloud users. The Chinese government has denied any involvement in the attacks, which can bypass the latest iPhone's stronger encryption.
FBI Director James Comey says he wants Congress to update a 20-year-old law to give law enforcement authorities access to the encrypted data of suspected criminals.
Apps for wearable devices that are designed to track a user's pulse rate, blood-oxygen level or location may be leaking that data during transmission, Symantec security researcher Candid Wüeest warns in a Black Hat Europe briefing.
Twitter is suing the federal government, seeking to pave the way to publish its transparency report that documents the government's requests for user information.
The development of authentication technologies that could replace the password is "nearing a tipping point," but there's still several years of work to do, says Jeremy Grant, who oversees the National Strategy for Trusted Identities in Cyberspace.
"Selling spyware is not just reprehensible, it's a crime," says a U.S. Justice Department official. So why are 245 local U.S. law enforcement agencies and prosecutors giving spyware away for free?
The CEO of a Pakistani software company has been charged with developing, selling and advertising spyware for illegal purposes. But a legal expert questions whether those charges will stick.
Apple announces security and privacy changes tied to the release of iOS8, including better data encryption, more secure iCloud backups, and a corporate promise to be more transparent. But it delays release of its HealthKit.
Federal government auditors have identified weaknesses in the technical controls protecting the security of the federally run Obamacare HealthCare.gov website and systems, which they say create increased and unnecessary risks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.