Social Security numbers stolen in defense agency data breach

Social Security numbers stolen in defense agency data breach

Department of Defense spokesperson Charles Prichard confirmed Thursday the agency had detected a breach of personally identifiable information on a system it hosts, and was in the process of notifying those affected by letter.

Europe can win global battle for industrial data, says EU industry chief

Europe can win global battle for industrial data, says EU industry chief

Vast troves of data from how fast we drive our cars to how much time a robot needs to churn out products will open a new front in the battle for digital dominance, said Thierry Breton, the European Commissioner in charge of the bloc’s single market.

Signal Is Finally Bringing Its Secure Messaging to the Masses

Signal Is Finally Bringing Its Secure Messaging to the Masses

Another new feature it's testing, called "secure value recovery," would let you create an address book of your Signal contacts and store them on a Signal server, rather than simply depend on the contact list from your phone.

Column: Equifax left unencrypted data open to Chinese hackers. Most big U.S. companies are just as negligent

Column: Equifax left unencrypted data open to Chinese hackers. Most big U.S. companies are just as negligent

Shackelford noted that the growing use of cloud-based data storage services run by the likes of Google and Amazon makes encryption more accessible to smaller companies.

CIA controlled global encryption company for decades, says report

CIA controlled global encryption company for decades, says report

Encryption weaknesses added to products sold by Crypto AG allowed the CIA and its German counterpart, the BND, to eavesdrop on adversaries and allies alike while earning million of dollars from the sales, according the Washington Post and the German public broadcaster ZDF, based on the agencies’ internal histories of the intelligence operation.

Protect our Speech and Security Online: Reject the Graham-Blumenthal Proposal

Protect our Speech and Security Online: Reject the Graham-Blumenthal Proposal

The Graham-Blumenthal bill would finally give Barr the power to demand that tech companies obey him or face overwhelming liability from lawsuits based on their users’ activities.

Your Poorly Secured Medical Credit Score Could Deny You Care

Your Poorly Secured Medical Credit Score Could Deny You Care

They're actually pretty excited about it:I spoke with Ashley Reede, an information systems and privacy consultant, who worked with a private hospital in California as they were onboarding Experian's 'Financial Clearance' system.

Swift Crypto helps more developers than ever to build secure applications

Swift Crypto helps more developers than ever to build secure applications

Apple has introduced a new open-source Swift Crypto package which makes the secure capabilities of Apple’s CryptoKit available to the wider Swift community — even if they’re deploying their software on platforms other than Apple’s own.

Breach at Indian Airline Affects 1.2 Million Passengers

Breach at Indian Airline Affects 1.2 Million Passengers

Using a brute-force attack, the researcher busted into an unencrypted database backup file containing the private information of more than 1.2 million passengers who flew with SpiceJet last month.

Secure Messaging: A Spy Primer

Secure Messaging: A Spy Primer

When I choose a secure messaging app, I pick apps that protect the most important thing to me… my personal data.Terms of Use/Service offer little/no data protection because they assume a user is engaging in a free service with the company.

Can hardware ever be trusted? The Betrusted project aims to find out by going back to basics

Can hardware ever be trusted? The Betrusted project aims to find out by going back to basics

Betrusted is more than just a secure CPU – it is a system complete with screen and keyboard, because privacy begins and ends with the user.” Its aim is to create a secure communication device whose hardware can be trusted, and which does protect privacy.

Exclusive: Apple dropped plan for encrypting backups after FBI complained - sources

Exclusive: Apple dropped plan for encrypting backups after FBI complained - sources

SAN FRANCISCO (Reuters) - Apple Inc (AAPL.O) dropped plans to let iPhone users fully encrypt backups of their devices in the company’s iCloud service after the FBI complained that the move would harm investigations, six sources familiar with the matter told Reuters.

Myths of Email

Myths of Email

Therefore, when considering an offshore email service, it is important to ascertain the status of a government’s independence and the facts pertaining to its privacy and data retention laws.Offshore email services with data retention and weak privacy standards should be avoided.

Consumer Reports warns IoT camera makers to improve their security

Consumer Reports warns IoT camera makers to improve their security

Consumer Reports has sent a letter to 25 manufacturers of IoT cameras with a call to improve their security.Consumer Reports warns the IoT camera manufacturers that its ratings will reflect whether it believes adequate steps have been taken to ensure the security and privacy of users is protected.

The FBI Got Data From A Locked iPhone 11 Pro Max—So Why Is It Demanding Apple Unlock Older Phones?

The FBI Got Data From A Locked iPhone 11 Pro Max—So Why Is It Demanding Apple Unlock Older Phones?

LightRocket via Getty ImagesQuestions are being asked about the FBI’s motivations over demanding Apple help it unlock the iPhones of the Pensacola shooting suspect, after Forbes uncovered a search warrant that strongly indicates the feds have access to a tool that can grab data on the latest, and most secure, iPhones.

What if everyone just said 'Nah' to tracking?

What if everyone just said 'Nah' to tracking?

Of this, it's reported that nine were requests for advertising, while more than ninety tried to send data off to "analytics" sites.Late last year, the New York Times ran its own analytics - on a leak of mobile location data - de-anonymising it, then identifying government officials.

Over 120 million X-Rays, CT scans exposed on the internet due to carelessness of hospitals: Report

Over 120 million X-Rays, CT scans exposed on the internet due to carelessness of hospitals: Report

Confidential personal health data belonging to millions of Indians are lying exposed on the internet because hospitals and medical institutions have not taken security precautions to safeguard this information.

Microsoft Outsourced Skype, Cortana Voice Analysis to China With Virtually No Security in Place: Report

Microsoft Outsourced Skype, Cortana Voice Analysis to China With Virtually No Security in Place: Report

A man walks past Google offices in Beijing in 2014.Photo: Greg Baker/AFP (AP)Microsoft had “no security measures” on a program that had humans transcribe user voice recordings from its Skype video calling service and Cortana assistant, the Guardian reported on Friday, even when those workers were located in China.

Skype audio graded by workers in China with 'no security measures'

Skype audio graded by workers in China with 'no security measures'

A Microsoft programme to transcribe and vet audio from Skype and Cortana, its voice assistant, ran for years with “no security measures”, according to a former contractor who says he reviewed thousands of potentially sensitive recordings on his personal laptop from his home in Beijing over the two years he worked for the company.

Lifelabs Data Breach, the Largest Ever in Canada, May Cost the Company Over $1 Billion in Class-Action Lawsuit

Lifelabs Data Breach, the Largest Ever in Canada, May Cost the Company Over $1 Billion in Class-Action Lawsuit

An October hack of medical testing company LifeLabs exposed the sensitive personal information of an estimated 15 million Canadians.The LifeLabs data breach included lab test results and national health card numbers along with personally identifiable information including names, dates of birth, home addresses and email addresses.

NitroPad: Secure Laptop With Unique Tamper Detection

NitroPad: Secure Laptop With Unique Tamper Detection

Thanks to the combination of the open source solutions Coreboot, Heads and Nitrokey USB hardware, you can verify that your laptop hardware has not been tampered with in transit or in your absence (so-called evil maid attack).

Wyze camera data leak: How to secure your account right now

Wyze camera data leak: How to secure your account right now

Passwords and payment information weren't included in the exposed database, but to be proactive and ensure user accounts remained private, Wyze signed everyone out and reset all third-party connections to its services, such as Alexa and Google Assistant.

Get yourself cybersecure for 2020

Get yourself cybersecure for 2020

“Most of the answers to security questions like these are easily acquired by hackers,” Tom Lysemose Hansen, founder of mobile app security vendor Promon, explains, “using simple trial-and-error methods based on LinkedIn, Facebook, Twitter and even Wikipedia data, which give away much of our personal and family details.” Indeed, it’s incredible, and incredibly worrying, what a simple Google search can uncover.

#Privacy: Pharmacy fined £275K for GDPR violation

#Privacy: Pharmacy fined £275K for GDPR violation

“Regardless of the exact number of care homes involved, given the volume of documentation and size of Doorstep Dispensaree’s business, it appears likely that hundreds and possibly even thousands of data subjects have been affected,” read the notice.

Tories switch to messaging app Signal after WhatsApp leaks

Tories switch to messaging app Signal after WhatsApp leaks

The Conservative party has started using the secure messaging service Signal for its internal communications with Tory MPs, following years of leaks from WhatsApp groups.Killock said: “It’s great to hear that Conservative MPs are learning about the virtues of Signal and secure private communications.

Private internet owner mulling plans for privacy suite in 2020

Private internet owner mulling plans for privacy suite in 2020

This comprehensive plan which we have started implementing we hope will lead the way to other companies in this space to follow suite and create a “no need for trust” echo system where all our stakeholders will be able to verify how our system works and handles information.

Firefox Announces New Partner in Delivering Private and Secure DNS Services to Users

Firefox Announces New Partner in Delivering Private and Secure DNS Services to Users

NextDNS Joins Firefox’s Trusted Recursive Resolver Program Committing to Data Retention and Transparency Requirements that Respect User Privacy.Firefox announced a new partnership with NextDNS to provide Firefox users with private and secure encrypted Domain Name System (DNS) services through its Trusted Recursive Resolver Program.

Firms and governments use the internet to spy on us. Should we care?

Firms and governments use the internet to spy on us. Should we care?

In the internet era, invasions of privacy come from two main directions.Second, governments and other public bodies have begun to take advantage of the tools of mass surveillance the internet provides in the name of better public security.

Offering software for snooping to governments is a booming business

Offering software for snooping to governments is a booming business

But some, including NSO Group, as well as Gamma Group (an Anglo-German firm) and Hacking Team (an Italian one which in April merged with another company to create Memento Labs), sell software to help governments access online data on persons of interest.

Filmmakers sue State Department over social media surveillance rules

Filmmakers sue State Department over social media surveillance rules

Earlier this month, the Department of Homeland Security revealed that it wanted to expand facial recognition usage to encompass identifying US citizens as they enter and exit the US, although it backed off this decision under criticism.