Privacy

Privacy | News, how-tos, features, reviews, and videos

vpn hub 960
Computerworld > Mobile voting via phone / digital ballot

Computerworld > Mobile voting via phone / digital ballot

Iowa Caucus chaos likely to set back mobile voting

While the app used to tally votes during the Iowa Caucus on Monday was not a mobile voting app, it could still undermine confidence in any future attempts to roll out the technology.

blockchain bitcoin circuitry global

Amid privacy and security failures, digital IDs advance

Blockchain-based digital wallets could give owners control over their digital identity in a way that would eliminate the business silo systems of today.

A 2020 sign is interwoven with a conceptal representation of abstract time.

How blockchain will kill fake news (and four other predictions for 2020)

As blockchain gains credibility in the marketplace, it's being piloted for uses never before considered. But the nascent technology will need to mature, both technically and as a part of a more complete ecosystem, before seeing...

medical data accessed via tablet / healthcare IoT monitoring

Yes, Google's using your healthcare data – and it's not alone

There's a multi-billion dollar industry built around collecting healthcare data and anonymizing it so it can be used for research; it's perfectly legal.

Computerworld > Mobile voting via phone / digital ballot

Utah county moves to expand mobile voting through blockchain

Utah County plans to allow disabled voters to use a blockchain-based mobile app to vote in November, and one city hopes to use an app for all of its citizens, who are mostly young, tech-savvy millennials.

Tor Browser  >  private / anonymous web browsing / binary onion

What is the Tor Browser? And how it can help protect your identity

The Tor Browser is a web broswer that anonymizes your web traffic using the Tor network, making it easy to protect your identity online.

conference / convention / audience / applause / clapping

Speaker disinvites at CyberCon spark controversy

NSA whistleblower Thomas Drake and Australian academic Dr. Suelette Dreyfus disinvited from speaking at CyberCon a week before the conference.

open door with sunlight shining through

Justice Department takes another run at encryption backdoors with ‘lawful access’

Law enforcement officials and experts on the distribution of child pornography gathered on Friday to make the emotional, if not technological, case that tech companies should open up their encryption schemes to police investigating...

California Consumer Privacy Act  / CCPA  >  State flag / secured data

California Consumer Privacy Act (CCPA): What you need to know to be compliant

California's new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.

CSO slideshow - Insider Security Breaches - Flag of China, binary code

Senator Warner seeks "grand alliance" to protect against surveillance threat from China’s tech dominance

The senator believes Chinese companies will be required to aid surveillance of the US, especially as 5G networks roll out.

mobile phone - privacy - security

The best privacy and security apps for Android

Forget malware scanners or over-the-top security suites: These are the apps that'll actually improve your security and protect your privacy on Android.

global network puzzle pieces

How I learned to stop worrying and love the splinternet

The web was never going to be worldwide. The idea of one single global internet is an obsolete fantasy.

European Union, EU

General Data Protection Regulation (GDPR): What you need to know to stay compliant

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that...

Facebook

Can Facebook be trusted with a virtual assistant?

A look at recent news has a lot to tell us about Facebook’s trustworthiness.

big brother privacy eye data breach security binary valerybrozhinsky getty

FEMA contractor at center of privacy violation provides services to many other agencies

Corporate Lodging Consultants provides lodging services to many other government agencies. Is more sensitive personal information at risk?

Facebook / privacy / security / breach / wide-eyed fear

Hey Facebook: Quit discouraging people from using 2FA

Facebook is spying on user 2FA phone numbers to target them with ads. A non-trivial percentage of Facebook users will not use two-factor authentication as a result, a net loss to security.

Globe with orbiting speech bubbles containing world flags, sitting on the edge of a laptop.

Traveling to China for work? Punch through the Great Firewall and securely connect with your home office

Security is not just about confidentiality and integrity. It's also about availability. The new partnership between Wickr and Psiphon is worth a look for global enterprises with traveling employees.

police homeland security

Can the police search your phone?

Enterprises work hard to protect company secrets. Here’s why the biggest threat may be law enforcement.

Load More
Recommended for You