Apple Fights UK Over Encryption Backdoors as US Officials Warn of Privacy Violations

Apple Fights UK Over Encryption Backdoors as US Officials Warn of Privacy Violations

Image: garloon/Envato Images Senior officials from the U.K. have privately met with their U.S. counterparts to clarify that their request for access to encrypted data in Apple’s iCloud is not a blanket demand; instead, they are seeking access solely to data linked to individuals already involved in crimes such as terrorism, according to Bloomberg. People familiar with the matter told the publication that the British officials emphasized separate warrants would be required for each access…

Read More

Apple Taking Legal Action Against UK Over Backdoor Demands

Apple Taking Legal Action Against UK Over Backdoor Demands

Image: TheClimateGroup/Creative Commons (2014) Apple is taking legal action against the U.K. government over demands to weaken its strongest cloud security measures, arguing that compliance would jeopardize user privacy and set a dangerous precedence. The Cupertino giant has taken the case to the Investigatory Powers Tribunal, the U.K.’s judicial body responsible for handling complaints regarding the use of surveillance powers by public authorities. It is challenging the legality of the Home Office’s order under the…

Read More

Dangers of DeepSeek’s privacy policy: Data risks in the age of AI

Dangers of DeepSeek’s privacy policy: Data risks in the age of AI

As AI technologies rapidly evolve and become more integrated into our daily lives, data privacy concerns have never been more urgent. Case in point: The newly popular AI tool DeepSeek. Behind the convenience the tool provides lies a privacy policy that should be a cause for pause for anyone who values their personal security. DeepSeek’s privacy policy openly states that the wide array of user data they collect goes to servers in China. This alone…

Read More

Celebrating Data Privacy Day: Experts share data protection insights

Celebrating Data Privacy Day: Experts share data protection insights

January 28, 2025 marks Data Privacy Day, an international event established to raise awareness for data protection best practices. Below, cybersecurity experts are sharing their insights on essential practices for protecting sensitive data.  Cyber preparedness James Hadley, Founder and CEO of Immersive Labs, discuses the value of cyber training and preparedness. Hadley states, “In 2024, we witnessed the fallout of major record-breaking data breaches; some of which resulted in more than 100 million people having…

Read More

Unchecked AI threatens consumer privacy — Regulation is crucial

Unchecked AI threatens consumer privacy — Regulation is crucial

As artificial intelligence (AI) becomes increasingly embedded into society — at home and in the office — through virtual assistants, automated services and workplace productivity tools, there is a pressing need for regulatory guardrails and governance policies to protect consumer privacy and data rights. Corporate AI adoption presents organizations with a rising threat of potential privacy violations. Shockingly, 45% of surveyed organizations have experienced unintended data exposure when implementing AI systems — a harsh reality…

Read More

Security leaders respond to the AT&T data breach

Security leaders respond to the AT&T data breach

On July 12, 2024, AT&T announced the records of calls and text messages of almost all AT&T cellular customers were compromised via a third-party cloud platform. According to a statement made by AT&T, the compromised data does not contain the content of the calls and text messages. It also does not contain personally identifiable information such as Social Security numbers, dates of birth or customer names. At this time, AT&T states there is no indication…

Read More

From check-in to check-out: Ensuring cybersecurity in hospitality

From check-in to check-out: Ensuring cybersecurity in hospitality

The hospitality industry has embraced technological advancements to enhance the guest experience, from automated check-in systems to smart devices in guest rooms. But there are hidden costs that guests need to bear at the expense of these innovations since new cybersecurity risks get introduced at every stage of the guest journey. In modern hospitality settings, the guest journey is increasingly digital, starting from the moment they book a room to the time they check out….

Read More

Why banning TikTok will not solve data security challenges

Why banning TikTok will not solve data security challenges

TikTok, the social media platform owned by the Beijing-based company ByteDance, has come under fire from Washington, D.C. lawmakers. Legislation signed into effect on April 24 includes a provision that requires ByteDance to sell the social media app in the next nine to twelve months or be banned in the United States. According to the Associated Press, the ban would not go into effect for at least a year and will likely take longer due…

Read More

Security isn’t convenient, and that’s a big problem in the age of AI

Security isn’t convenient, and that’s a big problem in the age of AI

Security isn’t convenient. For most of us, traditional cybersecurity protocols like CAPTCHAs, two-factor authentication and passwords can feel like barriers that stand in the way of productivity. Whether that’s making a purchase, accessing workplace data or trying to log into an app that you were inadvertently kicked out of — we want what we want, we want it now and we often want it at the expense of our own data security and privacy. In…

Read More

Get an Extra 20% Off a Lifetime of Powerful VPN Protection Through 4/7

Get an Extra 20% Off a Lifetime of Powerful VPN Protection Through 4/7

TL;DR: Protect your business’s data and privacy with a lifetime subscription to OysterVPN. It’s currently available to new users for the best-on-web price of just $32 with coupon code SECURE20 through April 7. There are three important reasons for businesses to use a VPN: to keep your work data safe from hackers, to protect your privacy by preserving anonymity online and to consume content that is inaccessible wherever you happen to be. However, not all…

Read More
1 2 3 14