- Welcome Guest
- Sign In
Businesses have been using secret scores created by data brokers to determine how much to charge consumers, whether to allow purchase returns, and what level of service to offer, among other things. "Most consumers will never know when they are the victim of a secret surveillance score," noted Laura...
Flaws in Amazon and Google smart speakers can expose users to eavesdropping and voice phishing. Researchers at Security Research Labs discovered that developers could create malicious apps for the Amazon and Google platforms to turn the smart speakers into smart spies. Using the standard development...
Online tech support scams have been on the rise for the past decade, as hackers found new ways to trick consumers into providing remote access to their computers in order to steal information. This tried-and-true scam currently relies on sophisticated social engineering, fueled by detailed user info...
Since the dawn of the Internet age, criminals have looked for ways to profit on unsuspecting people while they browse the Web. Viruses, malware and other schemes were invented to infect and infiltrate systems, both at the enterprise and consumer levels. One of the most successful forms of cybercrime...
If you've ever played chess, you know that each move you make has to be the best move. At one level, this is painfully obvious -- after all, who would choose to make a terrible move instead of a better one? -- but it's illustrative of an important concept. Specifically, the core reason it's true is...
Given the risk of non-compliance, it is prudent for businesses to take the time now to analyze and consider whether the CCPA applies to them -- and if so, what changes need to be made.
Two eGobbler malvertising exploits impacted 1.16 billion programmatic ads between Aug. 1 and Sept. 23, according to Confiant, which has been tracking the threat for about a year. The first targeted versions of Chrome prior to Chrome 75 on iOS. The flaw was fixed in the Chrome 75 rollout June 4. he s...
Google need not comply with the right to be forgotten outside of the EU, according to a European Court of Justice ruling. A global de-referencing would meet the EU's data protection objectives, the court said, but it found that numerous third states do not recognize the right to de-referencing or ha...
Google has announced tweaks to its privacy policy following earlier reports that its Google Assistant software was eavesdropping on user conversations. Although it does not retain Assistant audio recordings by default, according to Senior Product Manager Nino Tasca, the company has increased privacy...
Amazon is testing scanners that can identify a human hand to use as a payment method for in-store purchases. The company plans to introduce "Orville" to some Whole Foods stores by the beginning of 2020, and later expand it to all locations in the United States. Employees at Amazon's New York offices...
Apple has suspended audits of consumer interactions with Siri, and undertaken a review of practices and policies related to the voice assistant. Before suspending grading, the process involved reviewing a small sample of audio and computer-generated transcripts from Siri requests to measure how well...
Google's recent announcement of Privacy Sandbox -- an initiative to develop a set of open standards geared toward fundamental enhancements of privacy on the Web -- has stirred up a controversy. Blocking cookies is not a good idea for a number of reasons, and standardization of such efforts is needed...
Chinese government-affiliated hackers have been making a concerted effort to steal medical research, particularly cancer research, from U.S. institutions. The step-up in medical research theft appears to be linked to China's growing concern over cancer mortality rates and increasing healthcare costs...
They say that the key to good security is constant vigilance. As a practical matter, this means that it's important for security and network pros to pay attention to two things: changes in the threat landscape, so they can be on the alert for how their systems might be attacked; and changes and deve...
Social Media
See all Social Media