Privacy

February 9, 2016
Comments [0]

By Eduard Goodman and Paul Keane

Editor’s note: When the European Court of Justice invalidated a 15-year-old Safe Harbor agreement last October, it tossed Google, Apple, Amazon and hundreds of small and midsize U.S. companies that transact with European clientele into an ocean of uncertainty.

... Read More
August 6, 2015
Comments [0]

LAS VEGAS—Hacking the daily stuff of life is one theme emerging at this year’s Black Hat computer security conference. More than 10,000 computer security professionals, researchers and government workers are expected at the conference, which features 290 sessions describing network security flaws, attacks past, present and future, and how to guard against them. Black Hat is known as a conference where security types present the fruits of research that’s necessary, but at...

Read More
August 5, 2015
Comments [0]

Drones could help hack into personal computers, and, according to emails posted by WikiLeaks, military contractors may want to do that. Boeing and Hacking Team were in talks earlier this year to plant malware on drones to perform such activities, according to emails stolen from Hacking Team in July. How this could work: An al-Qaeda operative is hiding in the foothills of another country, which may or may not be protecting him from U.S. detection. The U.S. military could try hacking into that...

Read More
August 4, 2015
Comments [0]

By Byron Acohido, ThirdCertainty

In a move that could set a precedent for service providers, Google pushed back against the expansion of what’s become known as the Right to be Forgotten ruling, and refused to comply with a notice issued by French data protection agency Commission Nationale de l’Informatique et des Libertes mandating the company remove links from its domains worldwide (as opposed to removal by country only). “We respectfully disagree with the CNIL’s...

Read More
August 3, 2015
Comments [0]

A government contractor, several of whose employees were caught on video drunk while on a sensitive security mission in Afghanistan, now is being used to help fix the security breach at the Office of Personnel Management. “What are they thinking?” asked Sen. Claire McCaskill, D-Mo., who wants to know how the company got its contract from the OPM with no competitive bidding. “What in this company’s background gave them assurances that they are the company that can handle this incredibly...

Read More
July 30, 2015
Comments [0]

Instagram is a convenient and fun site for sharing your videos and photos with friends, family and colleagues. But the service, which by default allows anyone to view your profile, can leave you open to identity thieves if you don’t take steps to protect yourself.

You can protect your privacy and personally identifiable information (PII) on Instagram by making sure you adjust your privacy settings according to your tolerance...

Read More
July 30, 2015
Comments [0]

TrackingPoint makes a smart rifle that lets novices hit targets a half-mile away. Shooters digitally “tag” a target, then lock the trigger until the gun is positioned to nail it. It can connect to smartphones or tablets so someone can see what the shooter sees. But security researchers have found software flaws that would let anyone near enough for a Wi-Fi connection to remotely tinker with controls. In the worst case, a hacker could force a police sniper to miss while shooting at a criminal...

Read More
July 27, 2015
Comments [0]

Fiat Chrysler Automobiles will recall 1.4 million vehicles that can be cyber-hacked remotely, the first-of-its-kind callback. The National Highway Traffic Safety Administration said it will look into the recall to ensure all vehicles that could be affected are covered. “Opening this investigation will allow NHTSA to better assess the effectiveness of the remedy proposed by Fiat Chrysler,” NHTSA Administrator Mark Rosekind said, acknowledging the agency had urged the move. Owners will get a...

Read More
July 24, 2015
Comments [0]

Lax security left the U.S. Treasury’s computer system for tracking overseas threats to the U.S. financial system vulnerable to hackers, according to a government audit prepared in late 2014 and obtained by Reuters. U.S. spy agencies use the Treasury Foreign Intelligence Network to share secret information and to keep tabs on the impact of sanctions against countries such as Iran and Russia, as well as militant groups such as Hezbollah. The report gave no indication the foreign intelligence...

Read More
July 23, 2015
Comments [0]

Credit bureau Experian is the target of a class-action lawsuit alleging that the company negligently violated consumer-protection laws when it failed to detect that a customer of its data broker subsidiary was a scammer who sold data to identity thieves. The lawsuit follows the imposition of a 13-year jail sentence against Hieu Minh Ngo, who ran an ID theft service variously named Superget.info and findget.me. Ngo admitted hacking into or otherwise illegally gaining access to databases...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started