Data Privacy

Data privacy news, trends, analysis and practical advice

CEO indicted for company's alleged mobile spyware app

The CEO of a Pakistani company has been indicted in the U.S. for selling a product called StealthGenie that buyers could use to monitor calls, texts, videos and other communications on other people's mobile phones, the U.S. Department...

Germany orders Google to stop illegal user data processing

Google has refused to substantially improve user controls, the government says.


apple privacy

Malware program targets Hong Kong protesters who use Apple devices

A malware program that targets Hong Kong activists using Apple devices looks like it was developed by a nation-state, possibly China, according to Lacoon Mobile Security.

android encryption

FBI director worries about encryption on smartphones

TheFBI is concerned about recent moves by Google and Apple to include encryption on smartphones.

Nymi

Forget passwords -- the Nymi wristband uses your heartbeat for security

Toronto-based Bionym is working on a wearable device that uses a person's heartbeat to authenticate their identity

google logo

Google gets privacy lesson from EU data protection authorities

European Union privacy regulators want Google to make its privacy policies easier to find and understand.

Online guinea pig

Was Facebook & OKCupid’s research treating users like guinea pigs illegal?

Is it illegal to be guinea pigs for online research without our consent? A Maryland law professor says Facebook and OKCupid's psychological experiments were unethical and also illegal.

fiberlink wipedevice2

Fiberlink wipes one smartphone or tablet every three minutes

A study of 130,000 devices managed by Fiberlink’s MaaS360 showed that 450 mobile devices are wiped every day as part of a corporate security policies. That's about one device every three minutes.

Crime

Research: Predicting crime with anonymized mobile data vs re-identifying users is easy

Researchers in one study claim that anonymized mobile data can predict crimes, but another group of researchers claim re-identifying users via location data is easy.

home depot

Home Depot breach put 56M payment cards at risk

The breach of Home Depot's payment systems may have compromised 56 million payment cards as a result of malware that has since been eliminated, the company said Thursday.

Encryption

Google to turn on encryption by default in next Android version

Google is turning on data encryption by default in the next version of Android, a step that mirrors broad moves in the technology industry to ensure better data security.

Healthcare.gov still lacks some basic security controls

Healthcare.gov lacks several basic cybersecurity controls -- including strong passwords and consistent security patching -- nearly a year after the troubled launch of the insurance-shopping website, a government auditor said.

bittorrent bleep2

BitTorrent opens Bleep peer-to-peer encrypted chat program to public testing

Nine months after revealing plans to develop a decentralized and encrypted chat application, BitTorrent opened public testing for Windows, Mac and Android versions of the program. Called Bleep, the application supports voice...

Virtual model car wireless internet security

Once your car's connected to the Internet, who guards your privacy?

As more mobile devices connect to in-car infotainment and diagnostic systems -- and cars wirelessly connect to other vehicles, automated homes and roadways -- where you are and what you’re doing in your car could suddenly become very...

applecdn primary

Apple updates privacy policy, moves to reassure users

Apple has outlined a new privacy policy and set up a site to explain what data it collects from users and how it handles that information.

New device to help cops detect texting and driving

How will new device to help cops detect texting drivers know it wasn't the passenger?

A new 'radar gun' type gadget is being developed to help cops catch texting drivers, but how will the device tell the difference between texting while driving, voice-to-text, automatic replies and a passenger in the car who is doing...

Apple iOS 8 on iPhone

How IT should prep for iOS 8

iOS 8 isn't as much of a paradigm shift for enterprise users as some earlier releases, but that doesn't mean IT departments can easily it write off. Ryan Faas explains what's important.

Hackers had access to Goodwill hosting provider for 18 months

Hackers evaded security systems for 18 months at a hosting center that processed payment cards for Goodwill Industries, using the same type of malware that struck Target and other major retailers to steal card data.

NSA reform bill stalled with Congress headed toward fall recess

The U.S. Congress is unlikely to pass legislation to end the National Security Agency's widespread collection of U.S. telephone records before leaving Washington, D.C., on a two-month break.

U2 on iTunes

Apple releases ban-Bono tool after customers complain of free music

Apple today provided a tool to customers who want to delete the free U2 album, Songs of Innocence, that the company automatically downloaded to their iPhones and other devices.

Load More