What’s in your Facebook data? More than you think
Mark Zuckerberg is expected to testify today before Congress about his company’s role in the 2016 election, Cambridge Analytica, and his rather lax attitude toward the data of Facebook’s 2 billion...
View ArticleBills targeting sex trafficking to lead to crackdown on anonymous posts?
Two bills signed by President Donald Trump on Wednesday to fight the online facilitation of sex trafficking may end up limiting the ability of people to post anonymous comments on websites. The Allow...
View ArticleWhat ‘EFail’ means for your email privacy
It’s never been easy to encrypt email communications fully, from one end to the other. Security experts have long said the only way to secure email from snooping is to use a somewhat-cumbersome...
View ArticleFragmentation likely to hinder Android P’s security chops
MOUNTAIN VIEW, Calif.—Google is prepping the Android world for its next upgrade, code-named Android P, with an array of security and privacy enhancements. But even locking down a long-criticized...
View ArticleWhy GDPR is good for security and the economy
With the EU’s General Data Protection Regulation set to take effect May 25, businesses around the world are rightly focused on better protecting their users’ data. But the GDPR’s effects will reach far...
View ArticleHow updated privacy policies could make GDPR the global standard
As anybody who’s received numerous emails from technology companies in the past few weeks that their privacy policy has been updated to comply with the General Data Protection Regulation can attest,...
View ArticleApple’s Safari to Facebook’s Like and Share buttons: Dislike
The next version of Apple’s Safari browser will break a lot of buttons around the Web, with Facebook’s advertising strategy leading the collateral damage. Almost two hours into the keynote opening...
View ArticleLooking beyond the surveillance state
After developing technology to identify neo-Nazi symbolism in online forums, I’m coming to terms with the fact that it could be used for less altruistic purposes. Ten months ago, I started working on a...
View ArticleGet a new phone? Consider your Fifth Amendment rights
Late last month, citing the seizure of “various electronic devices and documents” in a filing in U.S. District Court in Los Angeles, longtime President Trump attorney Michael Cohen said he would invoke...
View ArticleMeet WeChat, the app that’s ‘everything’ in China
SHANGHAI—It takes just six characters to spell “everything” in China, and Mandarin fluency isn’t required. The far-more-than-messaging app WeChat dominates the mobile Web here. That’s been very good...
View ArticleFour things to note about the Supreme Court’s location privacy ruling
A U.S. official can’t learn where you are reading this without first obtaining a warrant. That privacy principle became law Friday, when the Supreme Court ruled 5-4 in Carpenter v. United States that...
View ArticleWhy (and how) bosses set up devices to ‘supervise’
If you’ve ever thought about driving your company car to a strip club during your lunch hour, don’t. Your employer may be watching you. A California construction worker found this out the hard way in...
View ArticleHow identity fraudsters operate
When U.S. Immigration and Customs Enforcement attorney Raphael Sanchez stole the identities of eight foreign nationals, he probably thought that he was picking on victims who would never report the...
View ArticlePrimer: Why Google is pushing HTTPS
Leading sites hosting services or content as broad as fantasy football, Doctor Who, and search in China have this in common: Google Chrome now marks them as unsafe to visit. As of Tuesday, the browser...
View ArticleHarassed or stalked online? Follow these 5 steps
In 1998, a column published in The New York Times recommended that people who were worried about online stalking change their email address to something that would be “hard to guess” and not to submit...
View ArticleVerizon’s VPN: security boon or privacy boondoggle?
Verizon, ostensibly aiming to better protect its customers’ data on mobile devices when using Wi-Fi while turning a gentle profit, is now offering a virtual private network. The wireless-service...
View ArticleIn post-massacre Vegas, security policies clash with privacy values
LAS VEGAS—Hackers gathered here for the annual Black Hat and DefCon conferences, among others, are sounding privacy alarms as hotel security personnel along the Las Vegas Strip demand access to their...
View ArticleHow a European Commission antitrust ruling could impact Android privacy
The threat of billions of dollars in European Commission antitrust fines could force Google, in the very near future, to give phone makers a chance to make Android far more respectful of consumer...
View ArticleNSA leader to hackers: Cybersecurity’s a team sport
LAS VEGAS—It wasn’t so long ago that DefCon attendees enthusiastically engaged in the conference pastime “Spot the Fed”—clearly separating themselves from employees of federal organizations like the...
View ArticlePlease stop sending sensitive messages via Slack
No matter how much you may want to snarkily rip into a co-worker over Slack, you may want to think twice before hitting Send. While Slack channels might look and feel private, they’re just as exposed...
View Article
More Pages to Explore .....