Identity access management and security services to drive worldwide spending growth.
The FTC is hosting a workshop on “informational injury,” asking about the “qualitatively different types of injuries” consumers experience “from privacy and data security incidents.”
Hikvision, a company 42%-owned by the Chinese government, sold devices that monitor U.S. Army base and Memphis streets. That has sparked concerns about cybersecurity.
Without the trust of consumers, third parties requiring consumer consent to use new rights of access to bank and payment account data will struggle to make an impact in the market.
Phishing beats keylogging as a means of hijacking email credentials, Google has found in a study.
Anyone casually surfing the internet at home can be deployed as an unwittingly productive member of a hacker’s workforce, a practice known as “cryptojacking” that is on the rise.
Internet-connected products can be used to eavesdrop on families or even communicate with children.
Google researchers develop a fast way to alert you to a stranger spying over your shoulder.
Stephen Gates is chief research intelligence Analyst at Zenedge which specialized in cloud-based denial-of-service-attack mitigation, API protection and bot management, among other things. Gates sees an uptick in API attacks and believes API risks are often completely overlooked, meaning hackers could take advantage of vulnerabilities, especially via mobile apps. “Hackers have determined that APIs are untapped territory and often can improve the likelihood of success in achieving their criminal outcomes,” he says.
A few weeks ago, Facebook announced it would be asking Australian users to upload intimate photos of themselves. The idea is a trial “Non-Consensual Intimate Image Pilot” program to prevent intimate images from being shared without consent on the internet. It is a refreshing change from the nefarious purposes intimate photos are usually used for on the internet (see “revenge porn,” the colloquial term for illicit image posting).