Privacy, Hacking and Virus Alerts

Sorry, we couldn't find any posts. Please try a different search.

Remote Work Has a Hidden Challenge: Data Security. Here’s How Experts Overcome It

These best practices can make a huge difference for any startup with remote employees.

This Google Engineer’s Privacy ‘Side Project’ Could Save People a Lot of Time in 2020

You’ve heard about the new privacy and security law in California? This makes it more usable.

Would You Hire Someone to Hack Into Your Company? These CEOs Did–and They Think You Should, Too

“Everybody talks about what keeps you up at night,” he says. “For me, the thing I worry about at 3 a.m. is being the target of a cyberattack.”

Hackers Are Targeting Your Small Business

Small businesses are being increasingly targeted by hackers, and it’s important to understand the threats and have contingencies in place.

Dozens of universities now use such technology to monitor students’ academic performance, analyze their conduct or assess their mental health.

Some worry that this will infantilize students in the very place where they’re expected to grow into adults, further training them to see surveillance as a normal part of living, whether they like it or not.

Building a World Where Data Privacy Exists Online

Dawn Song, an expert in computer security and trustworthy artificial intelligence, is working on making that vision a reality.

As Cyberthreats Grow, Government Cybersecurity Should Be Centralized

All levels of government, as well as the private sector, face growing dangers from cyberthreats.

Go read this New York Times exposé on smartphone location tracking because it’s worse than you think

Big brother is real

Five Holiday Scams to Avoid from LMG Security

Also: Discover why not all two-factor authentication is created equal, how to keep pen testing safe for everyone and what we can learn from data breaches

Company sues over North Dakota’s new caller ID anti-spoofing law

The North Dakota Legislature earlier this year passed a law that makes it a crime to “transmit misleading or inaccurate caller identification information with the intent to defraud or cause harm.” It also outlaws using a telephone number the caller does not own or have the consent to use.