Next Safari version will include do-not-track tool
Safari is the latest of the top four most popular browsers to receive a do-not-track privacy tool. So far, the feature is still being tested by developers, but if everything …
Privacy violations by popular mobile apps under investigation
An ongoing grand-jury investigation has revealed that many mobile applications could be sending various user information to advertising networks without the users’ …
Smartphone users feel more secure than PC users
Many users feel more secure using smartphones to surf the Internet than PCs, and a majority consider the risk of losing personal data higher on computers than on smartphones, …
Bogus Facebook app harvests user login credentials
A bogus application harvesting Facebook users’ login credentials has recently appeared on the social network, according to Symantec researchers. Luring in users with …
WhisperCore: Device and data protection for Android
WhisperCore is a secure Android platform dedicated to providing the security and management features necessary for transforming a consumer phone into an enterprise-class …
Millions in privacy violations wake-up the healthcare industry
What can healthcare organizations learn from the multi- million dollar penalties recently issued by the Department of Health and Human Services Office for Civil Rights (OCR) …
MacScan 2.8 released
SecureMac released MacScan 2.8, the latest version of its anti-spyware, privacy and security software for Mac OS X. Detect, isolate, and remove spyware as well as clean up …
IEEE database breached, personal info compromised
The Institute of Electrical and Electronics Engineers (IEEE) has notified the Attorney General of New Hampshire, the FBI and 828 of its members that a file containing the …
Half of U.S. tax payers are unaware about identity theft risks
While consumers take steps to protect themselves against identity theft and remain concerned about the possibility of a data breach when sharing their personal information, …
Two more Comodo RAs compromised
The investigation Comodo has mounted following the recent compromise of one of its Registration Authorities and the issuing of rogue certificates for popular sites has …
Harvest geolocation user info with Creepy
Creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is …
Lawyers appeal Twitter data handover decision in WikiLeaks case
Not satisfied with the court’s decision that it has to turn over account details of three of its users to the US Department of Justice, three Twitter users have filed a …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does