Generative Data Intelligence

Tag: FTC

EARN IT Act threatens end-to-end encryption

by Lisa Vaas While we’re all distracted by stockpiling latex gloves and toilet paper, there’s a bill tiptoeing through...

Analytics firm’s VPN and ad-blocking apps are secretly grabbing user data

by Lisa Vaas A popular analytics platform has been secretly installing root certificates on mobile devices so it can...

Australia’s privacy watchdog sues Facebook over Cambridge Analytica

Facebook is facing a privacy lawsuit from Australia’s information commissioner over the Cambridge Analytica scandal. More than 300,000 Australians were affected by the when Cambridge Analytica,...

California Proposal for Mandatory Cyber Insurance

Will California’s bill to force cyber insurance be a harbinger for the rest of the U.S.?On Feb. 15, California Assemblyman Ed Chau,...

South Korea’s Central Bank Is Building a New Blockchain System for the Bond Market

The Bank of Korea (BOK) is looking at developing a new blockchain system for the Korean bond market, one of the largest such...

DHS Warns of Cyber Heartbreak

Fraudulent dating and relationship apps and websites raise the risks for those seeking online romance on Valentine's Day.The US Department of Homeland Security's...

1 in 10 Americans admit to using ‘stalkerware’ to monitor their partners

For the ongoing series, Code Word, we’re exploring if — and how — technology can protect individuals against sexual assault and harassment, and...

When Your Used Car is a Little Too ‘Mobile’

Many modern vehicles let owners use the Internet or a mobile device to control the car’s locks, track location and performance data, and start...

Ringing in a new National Privacy Law?

Privacy advocates have long called for a federal privacy law and it’s coming…in the mean time, experts say complying with the CCPA will...

Hang-ups, hold-ups and hurdles passing federal privacy legislation

What are the biggest points of contention impeding passage of federal privacy legislation (and 3 other security laws)? Government at any...

Best practices for reducing third-party risk

The simple truth is that the security measures organizations put in place are not enough to protect them from threats. Third parties can present...

Analysis of popular apps finds rampant sharing of personal data

An analysis of 10 highly popular Android apps found what researchers are calling the “out of control” sharing of potentially sensitive information...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?