• News
  • Features
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine
  • Twitter
(IN)SECUREMagazine
 

Featured news

  • The importance of consumer trust in the second-hand mobile market
  • 2018 saw 6,515 reported breaches, exposing 5 billion sensitive records
  • Three reasons employee monitoring software is making a comeback
  • Machine learning fundamentals: What cybersecurity professionals need to know
  • Azure AD Identity Protection now revolves around risky users and risky sign-ins
  • Mozilla will use AI coding assistant to preemptively catch Firefox bugs
  • SaaS spending increasing by 78 percent year-over-year
  • How organizations handle disruptive data sources
  • Bank of Valletta suspended all operations in wake of cyber attack
  • Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises
  • Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats
  • Most wanted malware in January 2019: A new threat speaks up

data collection

Get our Top Stories to your inbox
Google hand

Google also abused its Apple developer certificate to collect iOS user data

  • January 31, 2019
  • Apple
  • certificates
  • data collection

It turns out that Google, like Facebook, abused its Apple Enterprise Developer Certificate to distribute a data collection app to iOS users, in direct contravention of …

Facepalm

773 million records exposed in massive data breach

  • January 17, 2019
  • credentials
  • data breach
  • data collection

Someone has compiled a massive collection of email addresses and plain text passwords, apparently from 2000+ hacked databases, and has made the trove freely available for …

icosahedral

Understanding how data becomes intelligence is central for any successful security program

  • January 10, 2019
  • cybersecurity
  • data collection
  • DFLabs

Threat intelligence is one of the hottest terms in information security at the moment. But, as with so many buzzwords, it is often overused and misused. All the buzz has …

data

Cybersecurity and ethical data management: Getting it right

  • November 14, 2018
  • CISO
  • cybersecurity
  • data collection

Data can provide information, information can lead to insight and knowledge, and knowledge is power. It’s no wonder, then, that seemingly everybody in this modern, …

Apple

European users can request a copy of the data Apple keeps on them

  • May 25, 2018
  • Apple
  • data collection
  • GDPR

Apple has set up a Data and Privacy portal where users can make a request to download all the data Apple has on them, correct their personal information, deactivate or delete …

dislike

Careless researchers expose millions of Facebook users’ sensitive data

  • May 14, 2018
  • data collection
  • data leak
  • Facebook

If you needed another reason to stop sharing intimate information with apps on Facebook or Facebook itself, consider this newest revelation: academics at the University of …

UK

UK High Court rules part of Snoopers’ Charter incompatible with EU law

  • April 30, 2018
  • data collection
  • EU
  • government

The UK High Court has ruled that part of the Investigatory Powers Act 2016 (nicknamed Snoopers’ Charter) is incompatible with European Union law and the European …

Facepalm

LocalBlox found leaking info on tens of millions of individuals

  • April 18, 2018
  • Amazon Web Services
  • cloud storage
  • data collection

LocalBlox, a US-based data technology company that “crawls, discovers, extracts, indexes, maps and augments data in a variety of formats from the web and from exchange …

question

Information security can enable business as soon as we change the conversation

  • April 10, 2018
  • CISO
  • cybersecurity
  • data collection

Information security is an enabler for business. This has been a mantra for some time, and although it is repeated at major conferences, the reality is that the lack of good …

Cambridge Analytica

Cambridge Analytica and Facebook’s privacy storm: Latest developments

  • March 20, 2018
  • Cambridge Analytica
  • data analytics
  • data collection

A day before the most recent exposé on Strategic Communication Laboratories (SCL)/Cambridge Analytica’s exploitation of user data syphoned out of Facebook to fuel …

Posts navigation

1 2 3 Next
bot

Machine learning fundamentals: What cybersecurity professionals need to know

  • Azure AD Identity Protection now revolves around risky users and risky sign-ins
  • Bank of Valletta suspended all operations in wake of cyber attack
  • Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises
  • Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats
Spot
light
NIST Cybersecurity Framework: Five years later

What's New

mobile device

The importance of consumer trust in the second-hand mobile market

earth

2018 saw 6,515 reported breaches, exposing 5 billion sensitive records

Microsoft Azure

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Mozilla

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

puzzle

How organizations handle disruptive data sources

hand

Increased appetite for biometrics fueled by speed, security and convenience

business

SaaS spending increasing by 78 percent year-over-year

Don't miss

earth

2018 saw 6,515 reported breaches, exposing 5 billion sensitive records

programmer

Three reasons employee monitoring software is making a comeback

bot

Machine learning fundamentals: What cybersecurity professionals need to know

Microsoft Azure

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Mozilla

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

hand

Increased appetite for biometrics fueled by speed, security and convenience

vault

Bank of Valletta suspended all operations in wake of cyber attack

danger

Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises

fire

Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats

Linux

Snapd flaw gives attackers root access on Linux systems

patch

February 2019 Patch Tuesday: PrivExchange hole plugged

question

SMBs spending a day each week dealing with cybersecurity issues

 
(IN)SECURE Magazine

Newsletters

Subscribe to get regular updates from Help Net Security. The weekly newsletter contains a selection of the best stories, while the daily newsletter highlights all the latest headlines!

  • Start
  • News
  • Malware
  • Articles
  • Reviews
  • Events
  • Copyright 1998-2019 by Help Net Security
  • Read our privacy policy
  • About us
  • Advertise
  • Design by FatDUX

  • News
  • Features
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine
  • Twitter

Copyright 1998-2019 by Help Net Security | Read our privacy policy | About us | Contact | Advertise

Design by FatDUX