Facebook’s counterintuitive way to combat nonconsensual porn – Naked Security

Lisa Vaas Lisa has been writing about technology, careers, science and health since 1995. She rose to the lofty heights of Executive Editor for eWEEK, popped out with...

Amazon Alexa Echo shared private conversation, claim married couple

It’s every Amazon Alexa owner’s worst nightmare – your private conversations not just being listened to, but shared with random contacts without your knowledge. I don’t have an voice-activated assistant in...

2FA setup on Facebook changed with the aim of increasing user security

Do try this at home! If you haven’t taken advantage of the extra protection that two-factor authentication offers, now is a great time to do so. And you don’t even...

Smashing Security #079: Mugshots, mobile mania, and back end gurus

A website which demands money if you want your mugshot removed, could “sharenting” lead to a rise in fraud and identity theft, and how could the FBI have overcounted encrypted...

Detecting Lies through Mouse Movements

Detecting Lies through Mouse Movements Interesting research: "The detection of faked identity using unexpected questions and mouse dynamics," by Merulin Monaro, Luciano Gamberini,...

A Data Protection Officer’s Guide to the Post-GDPR …

The EU's General Data Protection Regulation deadline is here -- now what? These four tips can help guide your next steps.Part 3 of our DPO's Guide to the GDPR Galaxy...

Turla Hacking Group Using Metasploit To Compromise the Target System

Turla cyber espionage group leveraging Powerful Mosquito backdoor using open source exploitation framework Metasploit for an initial stage of the attack on the target system. Turla hacking group actively targetting various countries, several...

Banking malware using inventive methods to attack Polish banks

ESET researchers have discovered a piece of banking malware that employs a new technique to bypass dedicated browser protection measures Banking malware (also referred to as banker) has been decreasing in...

Keeping 2 billion Android devices safe with machine learning

Google Play Protect provides in-the-moment protection from potentially harmful apps (PHAs), but Google's protections start earlier. Before they're published in Google Play, all apps are rigorously analyzed by our security...

Ahead of GDPR, Information Governance Comes into Its Own | Threatpost

LAS VEGAS – In sharp contrast to a year ago, a full 98 percent of US enterprises in a survey from the Information Governance Institute have embarked on information governance...

APLICATIONS

Businesses Calculate Cost of GDPR as Deadline Looms

Surveys highlight the financial burden of GDPR as companies scramble to meet the May 25 deadline.Businesses are under fire to achieve General Data...

HOT NEWS