A week in security (March 2 – 8)

A roundup of the previous week’s security headlines, including the introduction of a new series on child identity theft, an examination of law enforcement’s cybersecurity woes, a progress check on our stalkerware initiative, and more coronavirus scammers on the prowl.

Read more

Washington Privacy Act welcomed by corporate and nonprofit actors

The Washington Privacy Act would extend new data rights of access, correction, and deletion to Washington residents, with new rules on facial recognition.

Read more

WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation

We reveal the inner workings of WOOF locker, the most sophisticated browser locker campaign we’ve seen to date. Learn how this tech support scam evades researchers and ensnares users by hiding in plain sight.

Read more

Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks

Researchers called it KNOB, a clever attack against the firmware of a Bluetooth chip that can allow hackers to successfully hijack paired devices and steal their sensitive data. Are users at risk?

Read more

Facial recognition technology: force for good or privacy threat?

It seems facial recognition technology, as technology so often does, has raced far ahead of our ability to define its ethical use. We take a hard look at major concerns brewing in cities around the world.

Read more

Changing California’s privacy law: A snapshot at the support and opposition

Before the California Senate returns from its summer recess, we look at the authors, supporters, opponents, and donors involved in an extended fight to change California’s privacy law, the California Consumer Privacy Act.

Read more

A week in security (June 3 – 9)

A weekly roundup of security news from June 3–9, including Magecart, breaches, hyperlink auditing, Bluekeep, FTC, and facial recognition.

Read more

A week in security (May 13 – 19)

A roundup of security news from May 13–19, including ransomware attacks on the upswing, website hacking, pseudo-VPNs, bloatware, and more.

Read more

Hackers snab emails and more in Microsoft Outlook, Hotmail, and MSN compromise

Hackers made use of a compromised Microsoft support agent’s credentials to sneak a peek at its users’ Hotmail, MSN, and Outlook emails. How bad is it, and what has Microsoft done to correct it?

Read more

The global data privacy roadmap: a question of risk

For any American company taking steps outside the US market, global data privacy compliance is a question of risk versus reward.

Read more

Select your language