Transatlantic Cable podcast, episode 35
Credit to Author: Jeffrey Esposito| Date: Thu, 03 May 2018 13:58:32 +0000
Jeff and Dave discuss a Facebook dating app, Twitter selling data to Cambridge Analytica, and more.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Jeffrey Esposito| Date: Thu, 03 May 2018 13:58:32 +0000
Jeff and Dave discuss a Facebook dating app, Twitter selling data to Cambridge Analytica, and more.
Read MoreCredit to Author: Greg Young| Date: Thu, 03 May 2018 14:00:46 +0000

with contributing author, William J. Malik, CISA | VP, Infrastructure Strategies The date for General Data Protection Regulation (GDPR) compliance is three months away, yet many organizations, especially those outside Europe, remain unprepared. It turns out that the experiences from other privacy compliance regulations are less helpful than assumed, but the best lessons learned may be…
The post What HIPAA and Other Compliance Teaches Us About the Reality of GDPR appeared first on .
Read MoreCredit to Author: Trend Micro| Date: Wed, 02 May 2018 15:44:51 +0000

In the last post we highlighted the privacy risks associated with using popular social networking sites and browsers. You might not appreciate just how much of your personal data is being accessed by advertisers and other third parties via your social media accounts and internet browsing. Similarly, your privacy settings may have changed significantly since…
The post PROTECTING YOUR PRIVACY – Part 2: How to Maximize Your Privacy on Social Media and in Your Browser appeared first on .
Read MoreCredit to Author: Sarah Pike| Date: Tue, 01 May 2018 13:00:24 +0000
Stress relating to technology and cybersecurity is an escalating issue we can’t escape.
Read MoreCredit to Author: Trend Micro| Date: Tue, 01 May 2018 13:00:23 +0000

Most Americans today spend many of their waking hours online. In fact, we’re up to spending an average of five hours per day just on our mobiles. Much of this time is spent browsing the web or checking in, updating and sharing via our favorite social networks. There’s just one problem: unless you have your…
The post PROTECTING YOUR PRIVACY – Part 1: The Privacy Risks of Social Networks and Online Browsing appeared first on .
Read MoreCredit to Author: William Tsing| Date: Fri, 27 Apr 2018 16:00:00 +0000
![]() | |
| Smart toys attempt to offer what a lot of us imagined as kids—a toy that we can not only play with, but one that plays back. Many models offer voice recognition, facial expressions, hundreds of words and phrases, reaction to touch and impact, and even the ability to learn and retain new information. These features provide… Categories: Tags: IoT securityplease don’t buy thisprivacysmart toys |
The post Please don’t buy this: smart toys appeared first on Malwarebytes Labs.
Read More
Credit to Author: Tiziana Carboni| Date: Mon, 23 Apr 2018 05:09:46 +0000
Cinque suggerimenti che ti saranno di grande aiuto per mantenere te e le tue informazioni al sicuro<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/fl25kwDHOzg” height=”1″ width=”1″ alt=””/>
Read More
Credit to Author: JR Raphael| Date: Tue, 24 Apr 2018 03:00:00 -0700
Let’s get one thing out of the way right off the bat: If you’re looking for recommendations about Android security suites or other malware-scanning software, you’ve come to the wrong place.
Why? Because, like most people who closely study Android, I don’t recommend using those types of apps at all. Android malware isn’t the massive real-world threat it’s frequently made out to be, and Google Play Protect and other native Android features are more than enough to keep most devices safe.