Researchers called it KNOB, a clever attack against the firmware of a Bluetooth chip that can allow hackers to successfully hijack paired devices and steal their sensitive data. Are users at risk?
It seems facial recognition technology, as technology so often does, has raced far ahead of our ability to define its ethical use. We take a hard look at major concerns brewing in cities around the world.
Before the California Senate returns from its summer recess, we look at the authors, supporters, opponents, and donors involved in an extended fight to change California’s privacy law, the California Consumer Privacy Act.
Hackers made use of a compromised Microsoft support agent’s credentials to sneak a peek at its users’ Hotmail, MSN, and Outlook emails. How bad is it, and what has Microsoft done to correct it?
For any American company taking steps outside the US market, global data privacy compliance is a question of risk versus reward.
If your organization doesn’t have an anti-phishing plan in place, it’s time to start thinking about one. Here’s what to tell your employees and customers about phishing attacks.