eBook: Six Tips For Putting Your CRM Into Overdrive [Free Download]
Welcome Guest | Sign In
ECommerceTimes.com
Facebook Warned to Toe France's Privacy Line
February 10, 2016
CNIL, France's data protection authority, on Monday formally gave Facebook three months notice to comply with the French Data Protection Act. A working group of regulators from several countries recommended the action. On-site and online inspections, along with a documentary audit, disclosed that Facebook had failed to meet the requirements of the French Data Protection Act, CNIL said.
Hacker Posts Stolen Data on FBI, Homeland Security Employees Online
February 9, 2016
The U.S. departments of Justice and Homeland Security on Monday announced they were investigating reports that a hacker broke into government computer systems and stole sensitive information about employees at the agencies. The hacker posted stolen information for about 9,000 DHS employees online Sunday and made public data on 20,000 FBI employees Monday.
New Safe Harbor Pact Offers Temporary Port in Storm
February 9, 2016
Through an eleventh-hour maneuver, the United States and the European Union last week avoided action that could have choked the movement of data between the regions and caused financial harm to U.S. companies. It may be only a temporary respite, however. The problem stems from a European Court of Justice decision in October that blew up an agreement between the regions.
Keybase Releases Encrypted File-Sharing iPhone App
February 8, 2016
Keybase last week announced the alpha release of the Keybase app for the iPhone with a cryptographically secure file mount. Users can write data in an automatically created folder in this format: /keybase/public/username. Files written in the folder are signed automatically and appear as plain text files. The folder prevents server-side and man-in-the-middle attacks, Keybase said.
Report: 100 Ways to Improve Federal Cybersecurity
February 8, 2016
The U.S. government was shaken last year when the Office of Personnel Management disclosed that employment records affecting 21.5 million people had been breached. The Obama administration initiated several comprehensive actions designed to shore up federal data protection. A parallel initiative revealed that federal agencies still have a long way to go to strengthen cybersecurity performance.
Rugged Turing Phone to Run on Sailfish OS, Not Android
February 4, 2016
Turing Robotic Industries this week announced that it has uninstalled Google's Android mobile platform in favor of Jolla's Sailfish OS in its yet-to-appear secure smartphone. The Turing Phone, molded from a single unit of the Liquidmorphium liquid-metal alloy, is designed to be more durable to absorb shocks and prevent screen breakage. Preorder pricing starts at $610.
Europe, US Cut 11th Hour Safe Harbor Deal
February 3, 2016
Europe and the United States on Tuesday announced a new Safe Harbor agreement that neutralizes the threat of enforcement actions against domestic companies handling overseas data. The EU-US Privacy Shield aims to protect the privacy of data belonging to European citizens when it's handled by U.S. companies. It "will protect the fundamental rights of Europeans," said EU Commissioner Vera Jourová.
Harvard Researchers Debunk Warnings of Terrorists 'Going Dark'
February 2, 2016
The Berkman Center for Internet & Society at Harvard University on Monday released a report that questions the so-called "going dark" phenomenon. The U.S. government and surveillance and law enforcement agencies have been calling for an end to encryption because they say it lets terrorists communicate with impunity and is responsible for the inability of law enforcement to monitor communications.
FDA Guidelines Target IoT Medical Device Security
January 28, 2016
The U.S. Food and Drug Administration last week took a step toward addressing the threat the Internet of Things poses to patients and their data by releasing some proposed guidelines for managing cybersecurity in medical devices. "Networked medical devices, like other networked computer systems, incorporate software that may be vulnerable to cybersecurity threats," the FDA says in its proposal.
California Bill Would Ban Encrypted Smartphone Sales
January 25, 2016
California State Assemblyman Jim Cooper last week introduced a bill seeking to ban the sale of smartphones that include unbreakable encryption. It would require smartphones made on or after Jan. 1, 2017, and sold in California to be capable of being decrypted and unlocked by manufacturers or OS providers. Knowingly failing to comply would subject a seller or lessor to a fine of $2,500 per device.
Consumer Advocates Push FCC on Broadband Privacy Rules
January 22, 2016
A coalition of 59 organizations on Wednesday sent a letter to U.S. Federal Communications Commission Chairman Tom Wheeler calling on him to get cracking on privacy protection rules for consumers. The groups include consumer advocates such as Consumer Watchdog and the Chicago Consumer Coalition as well as the Center for Democracy and Technology and the American Association of Law Libraries.
Brave Browser Promises to Defend Users' Privacy
January 21, 2016
Brave Software, helmed by Brendan Eich, who cofounded Mozilla and created the JavaScript programming language, on Tuesday released the 0.7 developer version of its Brave browser. Brave is an open source project that promises to block Internet greed and ugliness, while improving speed and protecting privacy. Basically, it blocks ads containing tracking pixels and cookies.
FTC Issues Regulatory Warning on Big Data Use
January 20, 2016
The Federal Trade Commission is extending its regulatory reach to the e-commerce impact of big data. For years, the FTC has asserted vigorously its authority to apply existing consumer protection laws to emerging developments in the IT realm. Now it is signaling that it will apply that same vigor to big data under the regulatory authority it possesses through the FTC Act and other laws.
Privacy as a Service Advocates Promise Better Data Protection
January 14, 2016
There's been a lot of wailing and gnashing of teeth about the Sisyphean task of protecting privacy in the Digital Age, but that hasn't stopped innovators from searching for ways to preserve it. One of the latest ideas to emerge in the field is Privacy as a Service. As with many emerging technologies, the definition of "PaaS" (not to be confused with Platform as a Service) is in flux.
Periscope's Live Streams Now Pop Up in Tweets
January 13, 2016
Periscope on Tuesday announced integration with Twitter, allowing users to view its live-stream broadcasts directly in the Twitter iOS app. Previously, Periscope broadcasters could share only links to their videocasts in tweets. Now they can embed video directly into tweets, and the content can be set to autoplay. Periscope has more than 20 million user accounts, according to CEO Kayvon Beykpour.
EFF Urges Revival of Human Rights Case Against Cisco
January 13, 2016
The Electronic Frontier Foundation on Monday pressed to revive a lawsuit against Cisco Systems for violating human rights in China, in a brief filed with a U.S. Court of Appeals. Members of Falun Gong, a religious group persecuted in China, originally filed the lawsuit in 2011, but a federal district court in California dismissed it in 2014. The federal appeals court now is considering a challenge to that dismissal.
Administration, Silicon Valley Bigs Meet to Strategize on ISIS
January 13, 2016
Obama administration officials last week met with senior executives from several leading Silicon Valley firms in a summit on how to combat the proliferation of terrorist communications on social media networks. Attorney General Loretta Lynch, FBI Director James Comey, and John Carlin, assistant attorney general for national security, represented the DoJ.
ProPublica Launches News Site on Dark Web
January 12, 2016
ProPublica last week reportedly launched what's believed to be the first major news site on the dark Web. The site's purpose reportedly is to maximize the privacy of readers. The Tor hidden service goes beyond SSL in that visits to sites are hidden from eavesdroppers and ISPs. Anyone monitoring Tor nodes can track visitors who use a Tor browser to view ProPublica's regular site.
Uber Settles With New York AG After 'Playing God' With Data
January 8, 2016
New York Attorney General Eric Schneiderman on Thursday announced a deal that would require Uber to encrypt geolocation information about its riders, as well as enhance its data security practices. The AG opened an investigation into Uber in 2014, in response to allegations that the service had tracked riders and displayed their locations in an aerial format, known internally as the "God View."
Major Security Flaw Found in Silent Circle's Blackphone
January 7, 2016
Security researchers at SentinelOne on Wednesday revealed a vulnerability they discovered in the Blackphone. The flaw -- an obscure socket -- lets an attacker take over and control communications on the Blackphone, a highly secure Android smartphone Silent Circle developed and marketed in reaction to news of government surveillance of people's communications.
Iranian Cyberattack on American Dam Viewed As Rarity
January 7, 2016
Just days before Christmas, a rare event occurred: the report of a successful intrusion into America's infrastructure by overseas hackers. The event -- penetration of the control system of a dam 20 miles from New York City -- happened more than two years ago but wasn't made until last month. Cloaking such incidents in secrecy is standard operating procedure for industries that use control systems.
New Smart Cam Can Distinguish Between Cats, Cat Burglars and Cars
January 6, 2016
Netatmo on Monday announced a smart security camera and floodlight combo at CES 2016. The Presence camera is designed for outdoor use and can identify objects such as people, animals and vehicles. The camera, which connects to a rectangular floodlight, can be customized to send alerts to a smartphone app or desktop browser based on what it sees and where it sees it.
FTC Debates Cybersecurity Injury Standard
January 5, 2016
The U.S. Federal Trade Commission is engaged in an internal struggle over how it should assess the effect on consumers when businesses fail to provide proper e-commerce security. The outcome of the debate will have a significant impact on the FTC's ability to initiate cybersecurity violation cases. The legal issue could spill over to federal courts or even Congress for resolution.
Security Execs Sweat Insider Threats
December 31, 2015
Insider threats are becoming increasingly worrisome to corporate security executives. That is one of the findings in a survey of C-level businesspeople Nuix released last week. "The insider threat seems to be a bigger concern this year than it was in previous years," said Nuix's Keith Lowry. "People are recognizing that it is a significant weakness that has yet to be fully addressed."
China's Internet Tightrope Walk
December 30, 2015
Chinese President Xi Jinping recently told an international delegation of cybersecurity and technology experts that governments must be allowed to exercise sovereign rights and decision making over Internet use within their own countries. Speaking at the second annual World Internet Conference in Wuzhen, China, the president effectively called for a revised order in Internet governance.
All Security Pros Want for Christmas: Smarter Users, Decoy Networks
December 24, 2015
People like to see gifts from their wish lists under the Christmas tree, and security pros are no exception. Here are things some cyberwarriors would like old St. Nick to deliver to them. "It's probably never going to happen, but it would be fantastic to get smarter users who are less susceptible to social engineering," said Proofpoint's Ryan Kalember.
Apple's Cook Goes to the Barricades on Encryption
December 22, 2015
Apple CEO Tim Cook brought the encryption battle between the high-tech industry and the nation's law enforcement authorities to prime time TV Sunday in an interview on the CBS news program 60 Minutes. During the interview, Charlie Rose asked Cook about the need for law enforcement agencies to access data that has been encrypted on Apple phones. There's all kinds of sensitive information on smartphones today, Cook noted.
Congress Passes Budget Bill With Controversial Cybersecurity Provision
December 18, 2015
Congress on Friday passed an omnibus budget bill that included the Cybersecurity Information Sharing Act, or CISA. The Senate earlier this year passed CIS, which many conservative and liberal politicians, high-tech firms, and privacy and civil liberty advocates oppose. The latest version includes amendments that will allow corporations to share customers' information with the government.
MacKeeper Loses Control of User Data
December 17, 2015
Kromtech this week revealed a vulnerability in the data storage system of its MacKeeper software. Security researcher Chris Vickery, who alerted the company to the problem with its server, pegged the number of MacKeeper users affected at about 13 million. Kromtech posted a security alert about the breach on MacKeeper's website. The company fixed the error within hours of its discovery, it said.
UK Police Pinch Suspect in VTech Hack
December 16, 2015
UK police have arrested a 21-year-old man as part of their investigation into last month's hack on VTech's systems. The man was arrested in Bracknell, 30 miles west of London, on suspicion of unauthorized access to a computer to facilitate the commission of an offense and suspicion of causing a computer to perform functions to secure or enable unauthorized access to a program or data, police said.
See More Articles in Privacy Section >>
Facebook Twitter LinkedIn Google+ RSS
What is your reaction to the rumored
4-inch iPhone?
I'm in -- I'd love to have a smaller iPhone.
I prefer a larger iPhone, but it's good to have more options.
I expect innovation from Apple -- seems it's running out of ideas.
I'm not interested in an iPhone of any size.
Try MailChimp Pro