One probe calls TikTok’s #GDPR compliance into question due to data transfers to China. The other is on a theme that has been causing TikTok problems for years now: its collection and handling of the personal data of children.
A little under a decade ago, Google marketed its smart glasses as a combination of fashion and function that it expected to become a hot trend. Facebook is forging ahead with its own version, and regulators are not wasting any time scrutinizing it.
ProtonMail has built its reputation in no small part because of its pledge to not keep user IP logs except in "extreme criminal cases." A recent case indicates that the circumstances may not need to be all that extreme.
WhatsApp will soon roll out end-to-end encryption for chat backups, shutting down a favorite loophole exploited by law enforcement agencies, and giving WhatsApp an edge of market appeal.
The fact that phishing attacks have been on the rise is no secret. One of the most interesting developments is that malicious emails are now being timed to coincide with the "mid-afternoon slump" common to office workers.
A third-party platform that has the ability to pull fitness tracking data from nearly all of the major wearable device providers has been breached, leaving about 61 million records exposed.
After recent news stories revealed that current versions of iOS can be compromised with a zero-click exploit used by the controversial Pegasus spyware, Apple has issued a security update that it promises closes the hole for all users.
The mass shift to working from home precipitated by the Covid-19 pandemic created massive security challenges. A full 30% of remote workers under the age of 24 say that they circumvent or ignore security policies when they get in the way of getting work done.
House Democrats are looking to put reins on Big Tech through legislative means. A proposed $1 billion addition to the $3.5 trillion economic package would go to the FTC for the purposes of establishing a digital division.
UN data breach appears to stem from an employee login that was sold on the dark web. The attackers used this entry point to move farther into the organization's networks and conducted reconnaissance between April and August.