People trust email with their personal information more than they do dates, judging by a survey by Echoworx.
Since 2014, our digital security guide, Surveillance Self-Defense (SSD), has taught thousands of Internet users how to protect themselves from surveillance, with practical tutorials and advice on the best tools and expert-approved best practices.
One of the most pressing challenges in our Digital Single Market project (DSM) is to create an online environment that people can really trust.
While news of data leaks and malware attacks seem to be on the upswing, there are forms of web surveillance that reveal just as much data, only they are completely legal and receive much less publicity.
Google Chrome 63 will include a new security feature that will detect when third-party software is performing a Man-in-the-Middle (MitM) attack that hijacks the user’s Internet connection.
The rally of the alt-right in Charlottesville, Virginia—a motley crew of white supremacists, neo-Nazis, Ku Klux Klan types and anti-Semites—took many people by surprise. It horrified millions of people, who thought that a small, dying breed of elderly rednecks constituted the “alt-right” and the neo-Nazi fringe. But the alt-right too was in for a shock. The men chanting hateful slogans learned a lesson about modern society. They learned that it is hard, and maybe impossible, to stay anonymous in this day and age. They learned, too, that a person who is outed publicly as a neo-Nazi or white supremacist will sometimes pay a heavy price and suffer serious consequences.
Cybersecurity expert Bruce Schneier, a fellow with the Berkman Klein Center for Internet & Society, discusses what consumers can do to protect themselves from government and corporate surveillance.
Captive portals – intermediary screens that shown you the network’s Terms of Service and prompt you to click an “I agree” button – are to blame for a number of security issues, especially when it comes to HTTPS websites. HTTPS is meant to prevent traffic interception, alteration, and impersonation by a third party. But captive portals work by doing exactly that: they intercept and alter the connection between the user and the site they are trying to visit.
Many experts say lack of trust won’t hinder increased public reliance on the internet. Some expect trust to grow as tech and regulatory changes arise; others think it will worsen or maybe change entirely.
Responding to to China’s new cybersecurity regulations that require companies keep citizens’ data within the country’s borders Apple is opening a data center there. However, this move could threaten to disrupt the free flow of information over the internet.