This white paper on data privacy and data protection law and legislation in the US should prove to be a handy reference during ongoing privacy debates.
It’s one of the creepiest things you can experience on Facebook. You stumble across the profile of “another” user who appears to have stolen the details of your life – lock, stock and barrel. And they are spreading slurs about your character, and befriending your contacts…
More than 30 photos of the celebrities have been posted on Twitter by a hacker who appears to have stolen the pictures from the iCloud account of Styles’s mother, Anne.
New survey suggests medical data breaches increase the number of patients who hold back information from doctors due to concerns about the security or privacy of medical records, undermining treatment.
A troubling vulnerability has been uncovered that may make you think twice about ever even temporarily allowing a friend, partner or acquaintance to use your new LG V10 Android smartphone.
The UK’s Intelligence and Security Committee has deemed the latest Draft Investigatory Powers Bill as a “missed opportunity”, according to its latest report.
The ‘Selfie Generation’, which shares every detail of their lives online, doesn’t realize that giving away too much information can have serious consequences.
A referendum is to be held on Switzerland’s proposed surveillance law, a decision lauded by supporters of privacy. ESET’s Cameron Camp discusses further.
For too long streaming video gamers have suffered denial-of-service attacks and raids from police SWAT teams, often assisted by Skype leaking private IP addresses.
It has been almost half a year since Microsoft released Windows 10, and the decision whether or not to migrate computers to this latest release of Microsoft’s flagship operating system is going to be on the minds of administrators for 2016, says ESET’s Aryeh Goretsky.
British IT manager Mark Leigh is rueing the day that he was careless about information he shared without thinking via a smartphone app because – he believes – it ended up with him having two bikes stolen from his garage.
A malicious attacker could in theory use the leaked security certificate to launch a man-in-the-middle attack, intercepting Xbox Live usernames, passwords and even payments made by game players.
Edward Snowden has been offering advice on operational security to ordinary people, advocating, among other things, two-factor authentication and encryption.
TalkTalk talks numbers – revealing that “only 4%” of its users were affected by the hacking attack on its systems.
It has been claimed that the director of the CIA has had his personal email account breached by a teenager, with social engineering playing a part in the hack.
A hacker who used the notorious Blackshades RAT malware to hijack webcams on computers, and secretly watch people engaged in sexual activity, has received a suspended prison sentence.
FTC has the authority to hold organisations to account for failing to deliver tough cybersecurity measures.