Fifth of Google Play Apps Violate Child Protection Law

Fifth of Google Play Apps Violate Child Protection Law

One in five apps on Google Play designed for children appear to be breaking federal law, according to new research from Comparitech. The consumer rights and comparison site analyzed the top 300 free and top 200 paid apps on the marketplace under the children and family categories and reviewed each listed privacy policy. It found that one in five contravened the Children’s Online Privacy Protection Act (COPPA), legislation which places a strict set of FTC-enforced…

Read More

Ransomware Payments Could Be Tax Deductible – Report

Ransomware Payments Could Be Tax Deductible – Report

US organizations that choose to pay a ransom to their online extorters may be eligible to claim the money back from the Internal Revenue Service (IRS), it has emerged. A report from The Associated Press over the weekend cited tax lawyers and accountants who claimed the little-known clause could be a “silver lining” for ransomware victims. However, the deduction could also be seen as a further corporate incentive to pay up, encouraging more affiliate groups…

Read More

The Top 5 Vendor-Neutral Cloud Security Certifications of 2019

The Top 5 Vendor-Neutral Cloud Security Certifications of 2019

Most organizations have already begun their shift to the cloud. In its Cloud Computing Survey 2020, for instance, International Data Group (IDG) found that 81% of respondents had at least one workload or segment of their computing infrastructure in the cloud. That percentage could grow by the end of the year, as IDG found that 32% of total IT budgets will go to cloud computing—up from 30% in 2018. But the cloud comes with its…

Read More

Three-Quarters of SMBs Can’t Repel Cyber-Attacks

Three-Quarters of SMBs Can’t Repel Cyber-Attacks

Millions of the UK’s small businesses aren’t confident they can withstand a cyber-attack, with resources frequently diverted to other areas, according to new research from Arctic Wolf. The security operations vendor polled over 500 decision-makers in the UK working at firms with fewer than 250 employees to better understand their cyber challenges. It found that three-quarters (73%) believe their organization lacks the in-house expertise and capabilities to defend against cyber-attacks. The figure could amount to…

Read More

Voice-Activated Device Privacy: What You Need to Know

Voice-Activated Device Privacy: What You Need to Know

When it comes to evaluating technology in the home, there seems to be no shortage of new devices and shiny gadgets, mainly part of the Internet of Things (IoT), to discuss. Unfortunately, there seems to be no shortage of security issues to consider regarding these same devices, either. It’s not uncommon to hear of “virtual break-ins” caused by a malicious hacker connecting to a home’s network or accessing sensitive information through smart thermostats, refrigerators, and…

Read More

The Evolution of Securing Critical Infrastructure | The State of Security

The Evolution of Securing Critical Infrastructure | The State of Security

Everything evolves. Simply stated, the gradual development of something from a simple to a more complex form is what evolution is all about. When something ceases to evolve, yet still exists, it becomes classified as a living fossil. One example is the Ginkgo Biloba tree. It took millions of years for this evolution to cease. This all happened without any help from humans. When we think of our relationship with technology, it is apparent that we are nowhere…

Read More

The challenge of mask enforcement amid the pandemic

The challenge of mask enforcement amid the pandemic

The challenge of mask enforcement amid the pandemic | 2021-06-22 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

How to safeguard and optimize your assets through IoT and AI

How to safeguard and optimize your assets through IoT and AI

How to safeguard and optimize your assets through IoT and AI | 2021-06-22 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

10 tips for better security, safety and business intelligence

10 tips for better security, safety and business intelligence

10 tips for better security, safety and business intelligence | 2021-06-22 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

How communities can use technology to address gun violence

How communities can use technology to address gun violence

How communities can use technology to address gun violence | 2021-06-22 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More
1 2,218 2,219 2,220 2,221 2,222 2,583