Please turn on your JavaScript for this page to function normally.
How orgs should handle personal data on IT systems that they don’t control

Organizations should create a privacy program that keeps personal data at arm’s length, but under control, according to Gartner, which predicts that by 2019, 90 percent …

80+ orgs ask U.S. Congress to halt government surveillance

Over 80 organizations, civil liberty groups, Internet companies, public figures and private individuals have launched the StopWatching.Us initiative and have signed an open …

Tapproof security for Dropbox

SafeMonk today announced the public beta of its tapproof encryption solution designed specifically for users of the file-sharing service Dropbox. More than 100 million people, …

Obama, Verizon, NSA sued for collecting U.S. citizens’ phone call data

Three individuals have filed the first lawsuit aimed at disputing the constitutionality of NSA’s collection of metadata on phone calls made by or to U.S. citizens. Larry …

Reactions from the security community to the NSA spying scandal

Last week a whistleblower created quite the stir when he leaked documents about PRISM, a surveiilance program by the NSA. Below are comments on this scandal that Help Net …

ACLU asks spy court to release records on Patriot Act surveillance powers

The American Civil Liberties Union (ACLU) of Washington and Yale Law School’s Media Freedom and Information Clinic filed a motion on Monday with the secret court that …

NSA whistleblower reveals himself, world reacts

This last week has been the most eventful one in infosec history since I can remember. An (at the time unnamed) whistleblower has rocked the world by disclosing documents that …

Potential privacy problems for companies accepting Bitcoins

Businesses accepting Bitcoin payments might want to consider the privacy implications that such an option creates for its customers and for themselves. As you may or may not …

Video with NSA whistleblower Edward Snowden

This video features an interview with Edward Snowden, the man behind the most significant intelligence leak in U.S. history. Copyright © 2013 Praxis Films / Laura Poitras.

The future of online authentication

Recently, Twitter has introduced 2-factor authentication – the latest in a long list of large-scale web services that have taken this step including Google, Microsoft …

NSA has direct access to Google, Facebook, Apple servers

After yesterday’s news that Verizon is compelled to share all phone call metadata with the NSA on a daily basis comes the incendiary revelation that the spy agency has …

NSA legally forces Verizon to hand over all phone records on a daily basis

An order issued by the secret Foreign Intelligence Surveillance Court (FISC) that compels Verizon to share metadata on all the phone calls its users make with the NSA has been …

Don't miss

Cybersecurity news