The Everyday Cyber Threat Landscape: Trends from 2019 to 2020

Credit to Author: Trend Micro| Date: Mon, 06 Jan 2020 13:15:04 +0000

The past 12 months have been another bumper year for cybercrime affecting everyday users of digital technology. Trend Micro blocked more than 26.8 billion of these threats in the first half of 2019 alone. The bad news is that there are many more out there waiting to steal your personal data for identity fraud, access…

The post The Everyday Cyber Threat Landscape: Trends from 2019 to 2020 appeared first on .

Read more

Amid privacy and security failures, digital IDs advance

Credit to Author: Lucas Mearian| Date: Mon, 06 Jan 2020 03:00:00 -0800

Frustration over a growing number of privacy and security failuresin recent years is driving the creation of digital identities controlled only by those whose information they contain.

Known as “self-sovereign identities,” the digital IDs will be used by consumers, businesses, their workers and governments over the next few years to verify everything from credit worthiness and college diplomas to licenses and business-to-business credentials.

“We are slowly graduating from crawling to walking. It takes one to two years ’til we have reliable capabilities to spark meaningful decentralized identity adoption,” said Homan Farahmand, a senior research director at Gartner. “A major non-technical hurdle is for organizations to learn the concept and take the necessary steps to appropriately adapt their business processes to decentralized identity ecosystems.”

To read this article in full, please click here

Read more

Online privacy in 2019: a legislative review

Credit to Author: David Ruiz| Date: Mon, 23 Dec 2019 17:41:31 +0000

Americans enjoy no federal rights to access their data, correct their data, easily move their data from one company to another, or individually sue a company that invades their private lives online. Several US Senators want to change that.

Categories:

Tags:

(Read more…)

The post Online privacy in 2019: a legislative review appeared first on Malwarebytes Labs.

Read more