300 shades of gray: a look into free mobile VPN apps

Credit to Author: Jovi Umawing| Date: Tue, 10 Sep 2019 16:41:45 +0000

Mobile VPN apps are one of the best tools for protecting user privacy. Unfortunately, a notable number of are deemed unsafe. Read on to find out how to assess the best mobile VPN for you.

Categories:

Tags:

(Read more…)

The post 300 shades of gray: a look into free mobile VPN apps appeared first on Malwarebytes Labs.

Read more

US Congress proposes comprehensive federal data privacy legislation—finally

Credit to Author: David Ruiz| Date: Thu, 28 Mar 2019 15:00:00 +0000

The United States might be the only country of its size to lack a comprehensive data privacy law protecting its citizens’ online lives. That could change this year.

Categories:

Tags:

(Read more…)

The post US Congress proposes comprehensive federal data privacy legislation—finally appeared first on Malwarebytes Labs.

Read more

Why Is Your Location Data No Longer Private?

Credit to Author: BrianKrebs| Date: Sat, 26 May 2018 16:18:48 +0000

The past month has seen one blockbuster revelation after another about how our mobile phone and broadband providers have been leaking highly sensitive customer information, including real-time location data and customer account details. In the wake of these consumer privacy debacles, many are left wondering who’s responsible for policing these industries? How exactly did we get to this point? What prospects are there for changes to address this national privacy crisis at the legislative and regulatory levels? These are some of the questions we’ll explore in this article.

Read more

New Bill Seeks Basic IoT Security Standards

Credit to Author: BrianKrebs| Date: Tue, 01 Aug 2017 19:32:47 +0000

Lawmakers in the U.S. Senate today introduced a bill that would set baseline security standards for the government’s purchase and use of a broad range of Internet-connected devices, including computers, routers and security cameras. The legislation, which also seeks to remedy some widely-perceived shortcomings in existing cybercrime law, was developed in direct response to a series of massive cyber attacks in 2016 that were fueled for the most part by poorly-secured “Internet of Things” (IoT) devices.

Read more