Combating the Rising Threat of Malicious AI Uses (IM)

A group of academics and researchers from leading universities and thinktanks – including Oxford, Yale, Cambridge and Open AI – recently published a chilling report titled, The... More

How Safe are Social Media Platforms? (Internet Security Central)

Just how safe are social media platforms? Social networking companies are known to spend millions of dollars to keep their users protected from hackers on the internet. With ove... More

McAfee CEO: Ransomware is ‘Today’s Modern-Day Extortion’ (CNBC)

Ransomware is the 21st century's answer to extortion and the number of cyberattacks involving the malicious software is surging, according to the chief executive of McAfee. "It is ... More

Why Data Security Should be Top of Every Retailer’s Shopping List (Security Intelligence)

My recent shopping experiences demonstrate a growing trend: Consumers are becoming more security-savvy and realizing that their data is valuable and needs protection, particularly ... More

Do I Need a VPN for 2018? (Internet Security Central)

VPN is an acronym for Virtual Private Network. A VPN creates a secure network connection over a public network such as the internet. Simply put, instead of accessing the interne... More

Omate Partners with Tata Communications for Secure Smartwatch for Kids (Business Standard)

Global wearable and IoT solutions provider Omate on Tuesday announced a partnership with Tata Communications to equip its new "Omate x Nanoblock" smartwatch for kids with enhanced ... More

Verizon’s Oath for Data Privacy, Data Piracy (The Street)

As Verizon moves closer to completing the $4.48 billion purchase of Yahoo! , the risks and rewards of marketing online data are coming into sharper relief. Yahoo! became t... More

Jan. 28 Data Privacy Day Aims to Heighten Privacy, Security Awareness (StaySafeOnline)

Data Privacy Day began in the United States and Canada in January 2008 as an extension of the Data Protection Day celebration in Europe. Data Protection Day commemorates the Jan. 2... More

Five Unexpected Lessons from the Ashley Madison Breach (ARS Technica)

On December 14, 2016, the Federal Trade Commission settled a complaint with the company running the adult finder site Ashley Madison over the 2015 data breach that exposed the pe... More

Drones, IoT Influencing Information Security Regulations (TechTarget)

At the recent ISSA International Conference in Dallas, SearchCompliance editor Ben Cole met with conference speakers to discuss modern data protection threats and how they influenc... More

Congressional Report Sides with Apple on Encryption Debate (PC World)

The U.S. is better off supporting strong encryption that trying to weaken it, according to a new congressional report that stands at odds with the FBI’s push to install backdoors... More

‘Time’ Person of the Year Runner-Up: Hackers (Time)

Hackers have a bad name everywhere, it seems, except in Silicon Valley, founded as it was on the virtues of creatively overcoming technical limits by any means. This tradition prod... More

Before You Pay that Ransomware Demand … (Krebs on Security)

A decade ago, if a desktop computer got infected with malware the chief symptom probably was an intrusive browser toolbar of some kind. Five years ago you were more likely to get w... More

The Future of Privacy (New York Times)

This is an article from Turning Points, a magazine that explores what critical moments from this year might mean for the year ahead. Turning Point: Apple resists the F.B.I. in u... More

U.K. ISPs to Start Sending ‘Piracy Alerts’ Soon (TorrentFreak)

Early 2017 will see the long-awaited start of a broad UK anti-piracy effort. With help from copyright holders, ISPs will send email notifications to subscribers whose connections... More

Production Security Budgets, Workflows to be Tackled at Dec. 7 Content Protection Summit

How are studios and production companies budgeting for the security needs of film and TV shoots, and what are the baseline measures needed to secure every project? Those are the... More

NSS Labs: Encrypted Web Traffic on the Rise

Cyber security research and testing company NSS Labs is seeing a stark rise in enterprises using both Secure Socket Layer (SSL) and Transport Layer Security (TLS) encryption to sec... More

The Perfect Cybercrime: Selling Fake Followers to Fake People (New Scientist)

Hackers are recruiting the internet of things into a botnet. But this time they’re not trying to take down the internet. They’re just using them to make fake social media acc... More

Check Your Spotify Account: Users Report Unusual Activity After Credentials Posted Online (Financial Post)

If you use the popular music streaming service Spotify, there is a chance you may be vulnerable after a report has surfaced that the emails, usernames, passwords and other details ... More

Hackers Steal Millions of Minecraft Passwords (BBC)

Hackers have stolen login data for more than seven million members of the Minecraft site Lifeboat. Lifeboat lets members run servers for customised, multiplayer maps for the smart... More