Technology

Hackers Account for 90% of Login Attempts at Online Retailers (Quartz)

Selling stolen personal data is a big business for hackers: Somewhere on the dark web, your e-mail address and a few passwords are probably for sale (hopefully, old ones). Cyber cr... More

World Cup Live Streaming Piracy Thrived on Social Media Platforms (Forbes)

According to reports, piracy of the final stages of the soccer World Cup in Russia thrived in social media. The problem is not just for content providers. Consumers can also suffer... More

​Blockchain May Be Good for Security – But Not So Good for Privacy (WSJ)

Blockchain technologies are becoming increasingly popular as mechanisms to track transactions between parties. The advantage of this technology over its predecessors is its ability... More

If You Thought GDPR Was Bad – Just Wait for ePrivacy Regulation (IM)

EPR (ePrivacy Regulation) is essentially a complement to the GDPR covering all electronic communications and data. It is intended to provide a single digital data privacy framework... More

Cisco Security Experts Describe New Attack Vector for Old Malware (Appuals)

Security experts from Cisco’s Talos Comprehensive Threat Intelligence labs are issuing a warning about a new attack vector that a fairly old piece of malware has decided to explo... More

How Smart TVs in Millions of U.S. Homes Track More Than What’s on Tonight (NY Times)

The growing concern over online data and user privacy has been focused on tech giants like Facebook and devices like smartphones. But people’s data is also increasingly being vac... More

Is Corporate VPN Security Dead? (Security Intelligence)

The use of virtual private networks (VPNs) in the enterprise has come a long way. What was once a simple way to ensure a secure connection between an external network and a company... More

NSS Labs Honored for Achievement in Innovation (CDSA)

NSS Labs has been selected as a winner of the 2018 Red Herring Top 100 North America award, which recognizes innovative private technology companies in the region. This is the seco... More

Apple Renews iOS 12 Data Security Arms Race With Law Enforcement (eWeek)

Ever since Apple refused demands by the FBI to unlock an iPhone used by a murderous terrorist in December 2015, there’s been a struggle between the company and its pledge to prot... More

What Comes After Passwords? (WSJ)

What will life after passwords look like? For many companies, the goal is for the authentication of customer and employee identities to be nearly invisible, taking only a second as... More

New IBM Guardium Tool Detects Sensitive Data for GDPR Compliance (eWeek)

GDPR enforcement officially began on May 25, though an IBM study released on May 6 reported that the majority of organizations would not be compliant with the deadline. Wiggins com... More

Overcoming Challenges in Securing the Internet of Things (IM)

The frenzy surrounding all things IoT has quickly moved from unbridled excitement to dystopian warnings. From its potential to revolutionize the way we work and play, to visions of... More

As Mobile Ad Fraudsters Evolve, so Should Detection (TechWire Asia)

Now that apps are where the money’s at for advertisers, it’s time to talk about the elephant in the room – mobile ad fraud. A new, more sophisticated wave of duplicitous beha... More

Creators Face an Evolving Challenge Protecting IP (Raconteur)

The challenge for creators of original works, whether that is music, images, software or other original expressions of ideas, is how to protect those creations and make enough mone... More

Guarding IT Security Infrastructure (Gigabit)

It’s a 2,000-year-old question, and as relevant to today’s IT security landscape as it was in Juvenal’s time: Who will guard the guards themselves? We think of security infra... More

Kroll Launches Data Protection Officer Consultancy Services Ahead of GDPR (CDSA)

Kroll has launched Data Protection Officer (DPO) Consultancy Services ahead of the introduction of the European Union General Data Protection Regulation (GDPR) on May 25, 2018. Kro... More

Irdeto: Nearly Five Million Illegal Streamers Detected During Champions League Knockout Stages (CDSA)

As the football world gears up for the showdown between Liverpool and Real Madrid in this weekend’s UEFA Champions League Final, data from Irdeto reveals that a total of 5,100 un... More

Biggest Web Security Vulnerabilities Haven’t Changed Much – And That’s Not a Good Thing (DCK)

The OWASP Top 10 -- a list of the biggest vulnerabilities plaguing web applications -- hasn't changed much in the past 15 years. Cross-site scripting, injections, broken access ... More

Data Privacy in a Personalized Media World (Raconteur)

Television’s place at the heart of mass culture is no more. Streaming services provide higher revenues to entertainment companies than traditional broadcasting and media consumpt... More

If Video Killed the Radio, Will Malvertising Kill Your Website? (Security Intelligence)

If you’re an internet user, you’ve almost certainly seen a pop-up ad congratulating you for winning a prize and enticing you to click on a link to claim it. In reality, there... More