- Welcome Guest
- Sign In
The U.S. Department of Homeland Security this month will start sharing threat information with a small number of hand-picked companies under the newly enacted Cybersecurity Information Sharing Act. DHS hopes to collect threat indicators from companies and redistribute them so everyone gets a better ...
CEO Tim Cook on Tuesday brought Apple's dispute with the FBI to the public. Cook penned an open letter explaining the company's resistance to a federal magistrate's order to create software that would let authorities access data in an iPhone used by the shooters in last year's San Bernardino terrori...
U.S. Reps. Ted Lieu, D-Calif., and Blake Farenthold, R-Texas, last week introduced legislation to prevent states from passing laws banning the sale of smartphones with encryption capabilities. The ENCRYPT Act of 2016 provides that a state may not mandate or request that a manufacturer, developer, se...
CNIL, France's data protection authority, on Monday formally gave Facebook three months notice to comply with the French Data Protection Act. A working group of regulators from several countries recommended the action. On-site and online inspections, along with a documentary audit, disclosed that Fa...
The U.S. departments of Justice and Homeland Security on Monday announced they were investigating reports that a hacker broke into government computer systems and stole sensitive information about employees at the agencies. The hacker posted stolen information for about 9,000 DHS employees online Su...
Through an eleventh-hour maneuver, the United States and the European Union last week avoided action that could have choked the movement of data between the regions and caused financial harm to U.S. companies. It may be only a temporary respite, however. The problem stems from a European Court of Ju...
Keybase last week announced the alpha release of the Keybase app for the iPhone with a cryptographically secure file mount. Users can write data in an automatically created folder in this format: /keybase/public/username. Files written in the folder are signed automatically and appear as plain text ...
The Berkman Center for Internet & Society at Harvard University on Monday released a report that questions the so-called "going dark" phenomenon. The U.S. government and its surveillance and law enforcement agencies have been calling for an end to encryption because they say it lets terrorists c...
The U.S. Food and Drug Administration last week took a step toward addressing the threat the Internet of Things poses to patients and their data by releasing some proposed guidelines for managing cybersecurity in medical devices. "A growing number of medical devices are designed to be networked to f...
Brave Software, helmed by Brendan Eich, who cofounded Mozilla and created the JavaScript programming language, on Tuesday released the 0.7 developer version of its Brave browser. Brave is an open source project that promises to block Internet greed and ugliness, while improving speed and protecting ...
There's been a lot of wailing and gnashing of teeth about the Sisyphean task of protecting privacy in the Digital Age, but that hasn't stopped innovators from searching for ways to preserve it. One of the latest ideas to emerge in the field is Privacy as a Service. As with many emerging technologies...
The Electronic Frontier Foundation on Monday pressed to revive a lawsuit against Cisco Systems for violating human rights in China, in a brief filed with a U.S. Court of Appeals. Members of Falun Gong, a religious group persecuted in China, originally filed the lawsuit in 2011, but a federal distric...
Obama administration officials last week met with senior executives from several leading Silicon Valley firms in a summit on how to combat the proliferation of terrorist communications on social media networks. Attorney General Loretta Lynch, FBI Director James Comey, and John Carlin, assistant atto...
ProPublica last week reportedly launched what's believed to be the first major news site on the dark Web. The site's purpose reportedly is to maximize the privacy of readers. The Tor hidden service goes beyond SSL in that visits to sites are hidden from eavesdroppers and Internet service providers.